A two-dimensional array of ints, has been created and assigned to a2d. Write an expression whose value is the number of rows in this array.

Answers

Answer 1

Explanation:

oi.........................


Related Questions

Hey, um guys help me as my laptop will not turn off properly as whenever i turn it off, it will turn back on by me pressing a key please help!!! URGENT!!!

Answers

Answer:

hold the power key until you restart.

Explanation:

whats the recommended amount of dedodated wam
i can have in a server

Answers

Hi! The recommended amount of RAM that you should have is 6gb and above.

plz help me I need help​

Answers

Answer:

false

because it was used for the local people to have a fast calculation skill. An abacus is a manual aid to calculating that consists of beads or disks that can be moved up and down on a series of sticks or strings within a usually wooden frame. The abacus itself doesn't calculate; it's simply a device for helping a human being to calculate by remembering what has been counted.

Assume there are two variables, k and m, each already assigned a positive integer value and further assume that k's value is smaller than m's. Write the code necessary to compute the number of pertect squares between k and m. (A perfect square is an integer like 9, 16, 25, 36 that is equal to the square ot another integer (in this case 393, 4*4, 5*5, 6*6 respectively). Assign the number you compute to the variable q. For example, if k and m nad the values 10 and 40 respectively, you would assign 3 to q because between 10 and 40 there are these perfect squares: 16, 25, and 36.

Answers

Answer:

Lets us take k, m = 10, 40

q = 0

i = k

while i <= m:

   if int(i*0.5)*2 == i:

       q += 1

   i += 1

You are the IT Director for Stormwind training studios. Your company has decided to start using Microsoft Intune for all of their software deployments. You want to set up a notification system so that you see all alerts and your IT Manager only gets notified for Critical alerts. How do you accomplish this

Answers

Answer:

Well, if the IT Manager gets only critical alerts on a phone, then the IT Manager has to go to settings and make sure to have all alerts on.  

Explanation:

The IT Manager, probably has his notifications, critical alerts, on only. So the IT Manager should have his notifications to ALL. Where he will be able to see all of the alerts.

How should you behave in an online academic environment?

Answers

Answer:

as u want lol

I think it's funny

Answer:

Maintain discipline

Ask questions

Try not to crack jokes

dress smartly

be friendly

don't underestimate anyone each person have their own unique skills

What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?

Answers

Answer:

The file changes its location within your hard drive while the file itself remains unchanged

Explanation:

The file's location will change from C:\Users\username\Documents to

C:\Users\username\Pictures

List 10 different products made from timber

Answers

Answer:

Bath towels.

Toothpaste.

Nail polish.

Makeup.

Disinfecting wipes.

Medications.

Paints.

LCD screens.

Houses

Buildings

Explanation:

In what way, if any, has community building changed in the age of digital media? People’s community building has not changed in the age of digital media. People are now more willing to share highly personal information with strangers. People are now far less interested in building community or connecting with others. People are now more interested in forming communities based on physical location.

Answers

Answer:

People are now more willing to share highly personal information with strangers. Match each type of digital health, wellness, and security with examples of potential violations.

What does this mean

Don't use such phrases here, not cool! It hurts our feelings :(

Answers

A person is asking you not to use those words/sentences here because it hurt their feelings

The "muscles" of a computer are called the Central Processing Unit (CPU).
O True
O False

Answers

Answer:

false

Explanation:

what allows an individual or company to share a post with an audience however they are designed to be used with mobile devices and limit the size of posts

Answers

Answer:

E-mail

Explanation:

The sending of messages via the Internet is known as e-mail. It is one of the most often utilised functionalities for sending text, files, pictures, and other attachments across a communications network.

A podcast lets a person or corporation to share articles with an audience, but it is geared for usage on mobile devices and has a capacity restriction.

Select each procedure that will keep the computer safe and working properly. the correct answers are A, D, E
i just took it!


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.
Select each procedure that will keep the computer safe and working properly.


Gently type on the keyboard.

Download software from the Internet without permission.

Turn the power off on the computer before shutting down.

Wash your hands thoroughly before using the computer.

Set your water bottle on a table that is away from hardware.

Answers

Answer

Wash your hands thoroughly before using the computer.

Gently type on the keyboard.

Set your water bottle on a table that is away from hardware.

Explanation:

It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Answers

Answer:

Communication.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

(e) Give the output of the following:
String n="Computer Knowledge";
String m = "Computer Applications";
System.out.println(n.substring(0,8).concat(m.substring(9)));​

Answers

Answer:

Computer Applications

true

Answer:

Computer Applications

Explanation:

true

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

What defines interactive media? The user must play a role in writing the content of the media. The user must do something that determines what happens next. The user must help design the overall look and feel of the presentation. The user must provide feedback after using the media.

Answers

Answer:

What Is Interactive Media?

Interactive media is a method of communication in which the program's outputs depend on the user's inputs, and the user's inputs, in turn, affect the program's outputs. Simply put, it refers to the different ways in which people process and share information, or how they communicate with one another. Interactive media allows people to connect with others—whether that's people or organizations—making them active participants in the media they consume

Answer:

The user must do something that determines what happens next.

It is B.

PLEASE ANSWER ASAP

Type the correct answer in the box. Spell all words correctly.
What was the name of the database that Tim Berners-Lee built?
Tim Berners-Lee built a database called [BLANK].

Answers

Answer:

ENQUIRE database.

Explanation:

I am not sure but I guess this is the answer.

ou need to implement a wireless network link between two buildings on a college campus. A wired network has already been implemented within each building. The buildings are 100 meters apart. Which type of wireless antenna should you use on each side of the link

Answers

Answer:

High-gain and directional wireless antenna.

Explanation:

WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.

This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. Generally, the standard range or distance covered by WiFi is about 50 meters (160 feet).

Electromagnetic waves is a propagating medium used in all communications device to transmit data (messages) from the device of the sender to the device of the receiver through the use of an antenna.

In this scenario, you need to implement a wireless network link between two buildings on a college campus, which are 100 meters apart.

A high-gain antenna is an electromagnetic device that typically has a gain rating of 12dBi or sometimes higher. Also, a highly directional antenna can only receive radio signals from a specific direction and it compresses the radio waves that are being transmitted from a sender in to a very narrow beam.

Hence, the two (2) type of wireless antenna you should use on each side of the link are a high-gain antenna and a directional wireless antenna.

PLEASE HELP DUE!!!
WILL GIVE BRAINLIEST!!

can someone help me please?

Answers

Answer:

see below picture

Explanation:

You can work your way through the formula from the inside out, mapping every operation to a gate.

array Write a recursive function stringReverse that takes a string and a starting subscript as arguments, prints the string backward and returns nothing. The function should stop processing and return when the end of the string is encountered. Note that like an array, the square brackets ( [ ] ) operator can be used to iterate through the characters in a string.

Answers

user_in = str ( input ("Please enter a phrase: " ))

def reverse_str (string):

e = 0

for e in range (len (string)):

x = -1

print string[x]

x += (len (string))

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

Answers

Answer:

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

  3.1 Create bottle

  3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

See attachment for flowchart

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

  3.1 Create bottle

This increments the number of bottles by 1

  3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

An objective of the __________ is to provide a standardized set of I/O interface routines to user processes. Select one: a. working directory b. file management system c. indexed file allocation d. file directory Clear my choice

Answers

Option b (file management system) is used to provide a set of input/output interface.

A software package that focuses on providing numerous user-friendly features including productivity applications as well as file manipulations, respectively, would be termed as the file management system.

The other given alternatives such as:

Option a (Working directory) - The directory users are functioning in at present.Option c (Indexed file allocation) - The techniques of assignment dictate how documents have been saved on a disc.Option d (File directory) - A file storage place on your desktop.

These options are not connected to the given question. Thus the above answer is the correct one.

Learn more about the file directory here:

https://brainly.com/question/2170165

(a) Rewrite the following using if else statement:
int x;
String s=(x%3=0)? “Divisible by 3" : "Not divisible by 3";
System.out.println(s);​

Answers

Answer:

int x;

String s;

if ((x%3) == 0) {

   s = "Divisible by 3";

} else {

  s = "Not divisible by 3";

}

System.out.println(s);​

Explanation:

A : B ? C generally translates to if (A) { B } else { C }.

Note the == to compare to 0. The single = in the original expression is a mistake.

What are the 4 similarities of CUI and GUI

Answers

Answer:

letter U and I.

Three Letters

1 consonant and 2 vowel

All are capital letters

Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?

queries
forms
procedures
subroutines

Answers

Answer:

subroutines

Explanation:

subroutines is used in access to locate and retrieve data

Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comparisons between different values and not just relative comparisons. (c) the values being displayed have different units or very different magnitudes. (d) the reader need not differentiate the columns and rows.

Answers

Answer: (c) the values being displayed have different units or very different magnitudes

Explanation:

A table is refered to as an arrangement of data in rows and columns. Tables are used in research, communication, and data analysis.

Tables are used in the organization of data which are too complicated or detailed to describe and the use of table give a clearer description. Tables should be used when the values being displayed have different units or very different magnitudes. Tables can also be used in highlighting patterns or trends.

A team of architects is designing a new AWS environment for a company which wants to migrate to the Cloud. The architects are considering the use of EC2 instances with instance store volumes. The architects realize that the data on the instance store volumes are ephemeral. Which action will not cause the data to be deleted on an instance store volume

Answers

Answer:reboot

Explanation:

what is the right thing to do when you spot fake news​

Answers

Answer:

to tell the truth

Explanation:

l mean there is no reason to keep it secret

You install Windows 10 on a new computer. You update the video card driver and restart the computer. When you start the computer, the screen flickers and then goes blank. You restart the computer and receive the same result. You need to configure the video card driver. What should you do first

Answers

First, you need to cut off power to the PSUHit the switch on the back of the PC to turn off supply to the PSU. Extract the side panel (usually held on by two screws on the rear)If you do not already have a GPU installed, skip to Step 7.

3. Remove the screws holding the GPU in on the rear bracket. ...

4. Unlock the PCI-e slot clip.

5. Remove the GPU by lightly pulling on the card.

6. Hover the GPU over PCI-e slot.

7. Push down on the GPU to slide the connector into the slot.

8. Ensure the secure lock clicks into place.

9. Screw the rear bracket down to secure the card to the chassis.

10. Connect any required PSU cables.

11. Reattach the side panel,

Now, all you need to do is to plug in the display connectors on the rear of the case, whether they're DisplayPort, HDMI, DVI, or VGA. After that, hit the PSU power switch and boot up Windows. If the PC does not turn on or no signals get sent to the monitor, we'll need to double-check that all cables are connected correctly (both inside and on the rear of the PC), and the GPU is seated properly in the PCIe slot.
Other Questions
You have 3 pounds of egg whites. You need 8 oz to make one serving of consomm.How many servings can you make? Express the following composite numbers as products of prime factors 64 Compute the payback period for a project that requires an initial outlay of $297,771 that is expected to generate $40,000 per year for 9 years. Write an expression for the sequence of operations described below.divide s by u, add the result to t, then add v to what you haveDo not simplify any part of the expression is an atom of a metal? 7. Shawn plotted the data in a bar graph with two bars: one representing the number of bees per colony in the control cages and the other representing the number of bees per colony in the cages exposed to the fungicide. If the results support the hypothesis that fungicides harm bee development, what would you expect this bar graph to show? Describe the expected pattern in a few sentences. 3. Can a regular polygon have an interior angle of 160 13. Given that [tex] {x}^{2} + {y}^{2} + 10y + 16 = 0[/tex]and [tex] {(x - 3)}^{2} + {y}^{2} = 1[/tex] are two circles on the same plane. Find: a) the coordinates of the center and the radius for each circle. b) the equation of the straight line joining the center of both circles. Which comparing and contrasting method is used in the following? My two dogs, Ruby and Parker, are best friends. They spend a lot of time together. However, they could not be more different from one another. Ruby's favorite pastime is running around the backyard. She loves to chase after tennis balls, other dogs, and toys for hours. Parker, on the other hand, prefers to sleep in the backyard. When he goes out there, he lays under his favorite tree, napping for hours. Ruby and Parker also look completely different. Ruby is small, white dog with black spots, while Parker is a large, brown dog with only one color fur. What does the phrase Ive studied whiteness the way I would a foreign language suggest about Conley?A. He did not take his whiteness at face value but explored it.B. He was interested in researching identity at a young age.C. He viewed his race as an inferior aspect of his identity.D. He felt detached from his identity as a white person. Each of the sentences provided may contain a grammar or usage error. Read each sentence and then identify its error, if there is one, by choosing the appropriate letter. If there is no error in the sentence, choose no error.When you completed your homework so diligent, I knew that you had changed your attitude about accomplishing your academic goals.A) When youB) completed your homeworkC) diligent, I knewD)changed your attitudeE) no error Shockglass Company had a beginning inventory of $15,000. During the year, the company recorded inventory purchases of $45,000 and cost of goods sold of $50,000. The ending inventory must equal: A. $10,000. B. $25,000. C. $26,000. D. $27,000. 4(1\:-\:2b)\:+\:7b\:-\:10[tex]4(1\:-\:2b)\:+\:7b\:-\:10[/tex] A renter rented a house from a landlord. The renter and the landlord entered into a written lease providing that the renter was to pay a fixed monthly rent plus all taxes. A month later, the renter was offered a job in another state, and the renter assigned her lease to a friend by written agreement. The renter forgot to tell the friend that he was liable to pay the taxes on the residence during the period of the lease. As a result, the friend failed to pay the taxes on the house. The landlord was informed that there was a tax lien on the residence. She paid the lien and brought suit against the friend for the amount. Who will prevail what is chemical change ?? a square pyramid A is similar to pyramid the volume of pyramid are 1224 cubic.meters and 73 cubic meters the height of pyramid A is 18 meters. what are the possible lengths of one side if pyramid B's base? plz help I th the sentence) a. The good boy behaved well. (Underille c. We insist.... the blank b. Many of the houses in this neighbourhood (don'tdoesn't) have garages. (Choose one form from the bracket to complete the sentence) punctuality in this office. (Put the correct preposition d. It ..............be Anton's car, I saw him driving the car yesterday. (Put the e. She ............. (write) three books and she is working on another one, (P correct modal in the blank to complete the sentence) the verb from the bracket in correct tense to make a meaningful sentence) f. I need to stop (doing to do) my homework late at night. I keep making terrible mistakes. (Choose one form from the bracket to complete the g. The minister stood still ................. the request to take her seat (Put the 7. Marie Curie is the woman. She discovered radium. (Join the sentence correct conjunction in the blank to complete the sentence) sentence) with a relative pronoun) She said, "Would you like me to help you?" (Use the reporting verb of the sentence into indirect speech) Why ethanol is used in pectin extraction The following is a scatterplot of the percent of children under age 18 who are not in school or in the labor force vs. the number of juvenile violent crime arrests for each of the 50 states. The least-squares regression line has been drawn in on the plot. We would like to predict what the number of juvenile violent crime arrests would be in a state if 25% of children are not in school or in the labor force. This is called Explain 6 ways to mitigate carbon monoxide poisoning in an aircraft