True or False, A variable can be called or referenced before it has been defined.

Answers

Answer 1

Answer:

false?

Explanation:

im 99% sure


Related Questions

Which type of storage disk and disk drive can you use in the given situation?

Amy wants to borrow an interesting movie from Bruce so that she can watch it in her leisure time. Amy can hand over a (BLANK) to Bruce to copy 900 MB file. Bruce needs to have a (BLANK) drive to record data on the used DVD.


BLANK 1

CD
hard disk
DVD

BLANK 2

DVD-RR
DVD-recordable
DVD-RW​

Answers

I : DVD

II:DVD-R

A DVD-RW would work too.

The types of storage disk drives that can use in the given situation are as follows:

Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD.

What do you mean by Storage disk?

Storage disk may be defined as a type of hardware device that can be used to store and save digital data and applications which may be in the form of images, video, audio, etc. For example, CDs, DVDs, hard disks, pen drives, etc.

Hard disks generally store a large quantity of data like 120GB to 30.72 TB. But here the data required to be stored is only 900 Mb, so DVD is the most accurate choice for this storage. It stores 500Mb of data to 8.5 Gb. A single-layer HD-DVD stores up to 15GB of storage capacity.

Therefore, Amy can hand over a DVD to Bruce to copy a 900 MB file. Bruce needs to have a DVD-RW drive to record data on the used DVD.

To learn more about Storage Disk, refer to the link:

https://brainly.com/question/14762201

#SPJ2

Tell me everything that happened in the fortnight galactics event. WHO EVER HAS THE BEST EXPLANATION WILL GET BONUS POINTS AND WILL BE MARK BRAINLYNESS

Answers

Answer:

people still play fortnight?!?!

Explanation:

psn: Smallboy_life

What pets are on Terraria and how can you get them?

Answers

Answer:

There are over 15 new pets that can be found in chests and dropped rarely off enemies: Baby Dinosaur, Baby Eater, Baby Hornet, Baby Penguin, Baby Skeletron Head, Baby Snowman, Baby Truffle, Black Cat, Eyeball Spring, Pet Lizard, Pet Parrot, Pet Sapling, Pet Turtle, Squashling, and Tiki Spirit.

Explanation:

There are over 15 new pets that can be found in chests and dropped rarely off enemies: Baby Dinosaur, Baby Eater, Baby Hornet, Baby Penguin, Baby Skeletron Head, Baby Snowman, Baby Truffle, Black Cat, Eyeball Spring, Pet Lizard, Pet Parrot, Pet Sapling, Pet Turtle, Squashling, and Tiki Spirit.

Answer:

Depends on version

Explanation:

Check ther official website entering your vertion in ther

ten(10) examples of wearables or wearable technologies?​

Answers

Answer:read

Explanation:

airpods

headphones

earbuds

AirPods  pro

watch

fitbit (type of watch that counts your miles) &you can say workout watch&

VR set

technology bracelet

smart glasses

Smart ring

WILL GIVE BRAINLIEST!!!!!!
New space suits are being designed for future trips to the moon.

True

False

Answers

This is very much True

Answer:

True

Explanation:

Today, NASA unveiled its designs for future spacesuits that astronauts will wear during trips to the lunar surface.

Describe the scope of the variables in this code.

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

def __str__(self):
return self.species + " named " + self.petName

def changeName(self, newName):
self.petName = newName

class petCarrier:
size = 'medium'
color = 'red'

The scope of petName ______.

The scope of color is ______.

Accessible to the entire program
limited to the petCarrier class
limited to the pet class


(both of the blanks need one of those answers)

Answers

The scope of petName is local to the class pet.

The scope of color is accessible by all parts of the program.

How to interpret programming variables?

The variable petName is local to the class; This isdue to the fact that the variable was created in a function whose name begins with two underscores.

The variable color; This is created in the petCarrier class and is accessible to the entire function. This was not created in a function whose name begins with an underscore.

Read more about programming variables at; https://brainly.com/question/9238988

#SPJ2

Answer:

The scope of petName limited to the pet class

The scope of color is accessible to the entire program

Explanation:

edge

Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should he insert into the Word document?
standard text box
WordArt
callout
shape
picture

Answers

Answer:

C: Callout shape

Explanation:

The object that should he insert into the Word document is the callout function. The correct option is b.

What is Microsoft Word?

A component of Microsoft Office is Microsoft Word. The office is a collection of Microsoft products that can be used on Windows or macOS and contains Word, PowerPoint, Excel, Outlook, and numerous other tools for both private and professional usage. They aren't the same thing; Microsoft Word is merely one of such app.

A callout function is one of the functions that specifies a callout and is implemented by a callout driver.

The following collection of callout functions makes up a callout: a notification processing notifying function. A function called classifying handles classifications.

Therefore, the correct option is b. callout.

To learn more about Microsoft Word, refer to the below link:

https://brainly.com/question/2579888

#SPJ5

For which discipline is it most important to study computer technical support and networking?

Answers

Answer:

Studying computer technical support would contribute most to the disciplines of computer engineering and information technology.

have an amazing day! =)))

Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert

Answers

Answer:

Disruption of computer service

Explanation:

Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.

The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.

Images, symbols, and diagrams are types of

art objects
Graphs
graphics
presentation objects

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer to this question is :

Graphics

Because Graphics are the visual representation of information without text. Images, symbols, and diagrams are types of graphics. These graphics can be used in presentations to present information visually.

While other options are not correct because:

Art objects are some images or painting that is the artistic creation of aesthetic value. While graphs are the visual presentation of data and there are different presentation objects in PowerPoint such as images, symbols, text, and diagrams, etc. But it is noted that images, symbols, and diagram are not types of presentation objects but it is a type of graphics elements/objects.

You want to use the dist() method. Which line will allow you to enter the following code in IDLE?
>>>dist([2.5).(5.9))
5.0
from dist import math
from math import dist
from random import dist
from dist import random

Answers

Answer:

from math import dist

Explanation:

The dist() method is a part of the math module. So, to include it you have to use the following line of code:

from math import dist

hope this helped :D

The line which will allows you to enter the following code in IDLE is from math import dist.

What is dist() method?

The dist() function can be used to calculate a distance matrix, which shows the distances between the rows of a matrix.

The dist() method is a part of the mathematics module. Then, for

>>>dist([2.5).(5.9))

5.0 ,

we have to use code in IDLE as;

from math import dist

Thus, the line which will allows you to enter the following code in IDLE is from math import dist.

Learn more about dist() method.

https://brainly.com/question/25373810

#SPJ2

WILL GIVE BRAINLIEST!! 20 PNTS!!

A tree that shows how a webpage is laid out is called a-

A. Family Tree Document.

B. Diagram Object Model.

C. Document Object Model.

D. Document Graphic.

Answers

Answer:

B :)

Explanation:

.........

Hello! Thank you for asking this question on Brainly!

Your question is:

“A tree that shows how a webpage is laid out is called a-

A. Family Tree Document.

B. Diagram Object Model.

C. Document Object Model.

D. Document Graphic.”

The answer to your question would be B. Diagram Object Model.

According to Visual Paradigm, “An object diagram is a UML structural diagram that shows the instances of the classifiers in models. Object diagrams use notation that is similar to that used in class diagrams. Class diagrams show the actual classifiers and their relationships in a system.”

Have a great day!

<3

Compare and contrast the advantages and disadvantages of the Windows, Apple and Linux operating systems.

Answers

In apple, you may do other things that windows can not provide. Yet, Windows are good aswell since it has better things than apple. I’m so sorry if i’m wrong.

Write the steps to open file and folder​

Answers

Answer:

   1. Launch the File Open dialog. In the File menu, select the Open menu item.

   2. Open the folder containing the desired file.

   Select the desired file within the folder.

   3. (Optional) Specify a file format type.

   4. (Optional) Specify the character encoding.

   5. Click on the Open button.

Before entering an intersection, the safest searching process is to search ________. right, left, right, center left, center, right, left again center, right, center, right center, right, left, center again

Answers

Answer:

left, center, right, left again.

Explanation:

Generally, in accordance with the highway traffic laws and regulations, it is important and necessary that when entering an intersection even with a green traffic light signal, all drivers should check left, center, right, then left again so as to do a confirmation that there isn't any danger from oncoming vehicles or anyone else. If this is strictly adhered to by road users such as drivers, there would be a great reduction in the number of road crashes or accidents.

In a nutshell, before entering an intersection, the safest searching process is to search left, center, right, then left again.

Safety is very important. Before entering an intersection, the safest searching process is to search Left, Center, Right, and Left.

There is a safe process to take when entering an intersection.  When you have obeyed or yield to the sign facing you on the Intersection , you must then slow down and maybe stop if possible to let the other vehicles or pedestrians cross first and later on you drive ahead.

An intersection is also know as at-grade junction. This is simply the junction where two or more roads converge, diverge or meet and they are often at the same height. Looking Left, Center, Right, and Left is important before crossing an intersection.

Learn more about Road intersection from

https://brainly.com/question/24945907

Which is the correct expansion of the term Internet?

Answers

Answer:

international network is the answer

Answer:

http (hypertext transfer protocol)

Explanation:

its an application tool for distributed, collaborative, and hypermedia informations system and foundation of data for world wide web. HTTP is used to fetch and transmit the web page.

Which statement best describes the pros and cons of lack of regulation for cloud-based technology? Lack of regulation enables people to collaborate without the extra cost of paying a service provider; however, there is an increased opportunity for cybercrime. Lack of regulation speeds up the process of invention, but requires individuals to back up their own data. Lack of regulation encourages open innovation, but is not always secure. Lack of regulation encourages greater collaboration, but can lead to increased cost from price increases.

Answers

Answer:

3.) Lack of regulation encourages open innovation, but is not always secure.

Explanation:

Got it right in Introduction to Careers in Arts, A/V Technology and Communications

This road sign means
O road work ahead
vehicle breakdown
O service stations
O construction zone has ended

Answers

Answer:

A

Explanation:

Uh, yeah, I sure hope it does (to everyone who watched vine)

Construction zone has ended is the correct answer

what is a feature only used in powerpoint

Answers

I think powerpoint is the only presentation maker in which you can use 3D objects

Answer:

Slide transitions

Explanation: cause i got right

i'm sure 100%

1 Which of the following could work as bits for a binary system?
А The flip sides of a coin
B The fingers on one hand
C The days of the week
D The colors of the rainbow​

Answers

It’s B you can count it on ur fingers

Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT

Answers

Answer:

C. The energy used to create and maintain technology

#Carry on learning po

A company was asked to develop a smartphone app to help people locate a car of their choice to purchase from a complex of more than thirty used car dealers who all share a huge car lot. Name two features that that would be useful to potential customers.

Answers

Answer:

the gps and a map

Explanation:

Answer:

I think. it could be GPS and maps to but I may be wrong so yeah

What is the average rate of change of h(x)=2^{x+1}h(x)=2 x+1 h, (, x, ), equals, 2, start superscript, x, plus, 1, end superscript over the interval [2,4][2,4]open bracket, 2, comma, 4, close bracket?

Answers

Answer:

Average Rate = 12

Explanation:

Given

h(x) = 2^(x + 1)

Interval = [2,4]

Required

Determine the average rate of change

The average rate of change of h(x) is calculated using.

Average Rate = (h(b) - h(a))/(b - a)

Where

[a,b] = [2,4]

Meaning a = 2 and b = 4

So, the formula becomes:

Average Rate = (h(4) - h(2))/(4 - 2)

Average Rate = (h(4) - h(2))/2

Average Rate = ½(h(4) - h(2))

Calculating h(4)

h(4) = 2^(4+1)

h(4) = 2⁵

h(4) = 32

Calculating h(2)

h(2) = 2^(2+1)

h(2) = 2³

h(2) = 8

So, we have:

Average Rate = ½(h(4) - h(2))

Average Rate = ½(32 - 8)

Average Rate = ½ * 24

Average Rate = 12

Hence, the average rate of change is 12


HELP PLEASEEEE!!!!!!!

Answers

This is too little points for a question I’m sorry.

What do microphone means

Answers

Answer:

A tiny phone

Explanation:

It means a tiny phone

Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.

Answers

The procedure depends on the software and methods she uses.

In photoshop or InDesign she might need to fdrag and drop the title to the new location.

In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.

List any ten keyboard symbols.​

Answers

Answer:

Esc- Esc (escape) key.

F1 - F12 What are the F1 through F12 keys?

F13 - F24 Information about the F13 through F24 keyboard keys.

Tab Tab key.

Caps lock- Caps lock key.

Shift- Shift key.

Ctrl - Control key.

Fn- Function key.

Alt- Alternate key (PC only; Mac users have an Option key).

Spacebar- Spacebar key.

Hope this helps, have a great day/night, and stay safe!

Wires,plugs,speakers, chis are all examples of what

Answers

Answer:

Ch1kenT3nders

Explanation:

A workspace that an employee accesses using a Web browser fits the definition of a _____.

•mobile device
•Wifi-enabled device
•collaborative environment
•virtual workspace​

Answers

Answer:

virtual workspace

Explanation:

I hope I've helped

The advancements in which of the following technologies has most changed the American job market in recent years?
A.
computer and Internet
B.
manufacturing
C.
transportation
D.
health care

Answers

Computer and internet

This is the answer because over the years the computer have gotten smaller and more efficient. Internet has gotten better because it’s faster and they’ve made 5G.
Other Questions
Policy in which stronger nations extend their economic political and military control over weaker territories A radioactive isotope has half life of 10dsys. what is the time required for the activity of the isotope to fall to a 16th of it's original value? 58 x 64 is the same as:(64 x 50) + (64 x )What number goes in the space?help please Chang wants to know if he is improving What was the total distance the ball travelled? how is the image of buda ilkhantha peculiar? will some one right a paper for me? I need it soon thanks A fastball is hit straight up over home plate. The ball's height, h (in feet), from the ground is modeled by = 16 +103+5 where t is time (in seconds). In Furman v. Georgia, the Supreme Court ruled that the death penalty violated the Eighth Amendment because the death penalty wasAused to deter criminalsBused in nonviolent casesCapplied unequally across states.Dalready abolished in most states ong answer, but make sure to proviyoureasoningSales Company:W.D. Widgets is a small company that sells widgets. They're mostly made up of salespeople who work with lots of clients.You've taken over as the sole IT person for this company of 80-100 people.R teils you to provision a machine for a new employee, you order the hardware directly from a business vendor.You keep one or two machines in stock, in case of emergency. The users receive a username that you generate for them.You then give them an orientation on how to login when they start. You currently manage all of your machines usingWindows Active Directory. The company uses only Windows computers. When a new computer is provisioned, you haveto nistallots of sales-specific applications manually onto every machine. This takes a few hours of your time for each15machine. When someone has an IT-related request, they email you directly to help them.Almost all software is kept in-house, meaning that you're responsible for the email server, local machine software, andinstant messenger. None of the company's services are kept on the cloud.Customer data is stored on a single file server. When a new salesperson starts, you also map this file server onto theirlocal machine, so that they can access it like a directory. Whoever creates a folder on this server owns that folder andeverything in it. There are no backups to this critical customer data. If a user deletes something, it may be lost foreveryone. Dalia used a balancing move to begin to solve theequation below.6x + 12 = 10x - 4The result of Dalia's first step was 12 = 4x 4.Describe the first step Dalia made to solve the equation. what is slope function which of the following cells shows the process of a nucleus? a. prokaryotic b. eukaryotic c. both It is the typical cartoon scene: Popeye off sailing or toting a sledgehammer doing whatever Popeye does to make a living, while Olive Oyl, who does not have a job, lounges around. I ask the question: Why are women in cartoons constantly in need of male rescue? Ultimately, women should be able to stand on their own without the assistance of a man.Which sentence states the argument? MACRS requires the use of one of three conventions. The convention that generally applies to all classes of property except real estate is:______.a. the mid-year. b. the mid-month. c. the mid-quarter. d. the mid-life. Which change will cause the gravitational force between a baseball and a soccer ball to increase?A. moving the balls farther apartB. wrapping the soccer ball in layers of duct tapeC. using a baseball with a thinner leatherD. removing the outer layer of the baseball What is the value of y? 5,6,or 10 7. A. How many moles of Calcium hydroxide (CaOH2) are needed to completely react with 14.5 mol of Phosphoric acid (H3PO4)?2 H3PO4 + 3 Ca(OH)2 6 H(OH) + Ca3(PO4)2a. How many moles of water (HOH) will be produced?b. How many moles of Calcium Phosphate (CaOH2) will be produced? PLEASE SOLVE Michelle delivers books to school libraries. Her truck has a slide out ramp for unloading thebooks. The top of the ramp is 3 feet above the ground. The ramp itself is 5.2 feet long What isthe horizontal distance the ramp reaches? .When organizing your business writing, you want to make sure thatYour name is at the top right cornerb. The main idea is at the very beginningC Each sentence contains many ideasd Each point has some fluff to make it longer