what is the best programming language now​

Answers

Answer 1

Answer:

python is the best programming language

Answer 2

Answer:

The 9 Best Programming Languages to Learn in 2021

JavaScript. It's impossible to be a software developer these days without using JavaScript in some way. ...

Swift. If you're interested in Apple products and mobile app development, Swift is a good place to start. ...

Scala. ...

Go. ...

Python. ...

Elm. ...

Ruby. ...

C#


Related Questions

The function of an audio mixer is to _____. layer audio tracks at their ideal volume combine, control, and route audio signals from inputs to outputs process and edit pre-recorded audio signals automatically adjust volume for audio channe

Answers

Answer: combine, control, and route audio signals from inputs to outputs

Explanation:

A audio mixer is refered to as the sound mixer or the mixing console and it's an electronic device that's used for mixing, and combining several audio signals and sounds.

The input to the console is the microphone. The audio mixer can also be used in controlling digital or analog signals. These are then summed up in producing output signals.

Therefore, the function of the audio mixer is to combine, control, and route audio signals from inputs to outputs.

A backbone network is Group of answer choices a high speed central network that connects other networks in a distance spanning up to several miles. a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information. a network spanning a geographical area that usually encompasses a city or county area (3 to 30 miles). a network spanning a large geographical area (up to thousands of miles). a network spanning exactly 200 miles with common carrier circuits.

Answers

Answer:

a high speed central network that connects other networks in a distance spanning up to several miles.

Explanation:

A backbone network functions just like the human backbone providing support for network systems by offering a network infrastructure that allows small, high speed internet connectivity. It is a principal data route between large interconnected networks which offers connection services spanning several miles. Most local area networks are able to connect to the backbone network as it is the largest data connection on the internet. This backbone networks are mainly utilized by large organizations requiring high bandwidth connection.

Virtualization:

a. can boost server utilization rates to 70% or higher.
b. has enabled microprocessor manufacturers to reduce the size of transistors to the width of an atom.
c. uses the principles of quantum physics to represent data.
d. allows smartphones to run full-fledged operating systems.
e. allows one operating system to manage several physical machines.

Answers

The answer: A

If you would like to understand more on this, I have found an excellent quizlet.
Search this up: Using IS for Bus. Problems chp.5 practice quiz

Your organization network diagram is shown in the figure below. Your company has the class C address range of 199.11.33.0. You need to subnet the address into three subnets and make the best use of the available address space. Which of the following represents the addressing scheme you would apply to the New York office and Toronto Office?
(A) 199.11.33.160/31
(B) 199.11.33.0/25
(C) 199.11.33.128/27
(D) 199.11.33.0/31
(E) 199.11.33.160/30
(F) 199.11.33.128/28

Answers

Answer:

aaaa

Explanation:

Prepare an algorithm and draw a corresponding flowchart to compute the sum
and product of all prime numbers between 1 and 50.

Answers

Answer:

Explanation:

Given

Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.

Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer.

Answers

Answer:

Hence the complete implementation of python code that reads two files and merges them together.

def merge_file(past_file_path,proposed_file_path, merged_file_path):

   past_file_contents=load_file(past_file_path)

   proposed_file_contents=load_file(proposed_file_path)

   proposed_customer_name = []

   for row in proposed_file_contents:

       proposed_customer_name.append(row[1])

   with open(merged_file_path,'w') as outputf:

       outputf.write("Customer Number, Customer Name, Address\r\n")

       for row in proposed_file_contents:

           line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"

           outputf.write(line)

       for row in past_file_contents:

           if row[1] in proposed_customer_name:

               continue

           else:

               line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"

               outputf.write(line)

       print("Files merged successfully!")

# reads the file and returns the content as 2D lists

def load_file(path):

   file_contents = []

   with open(path, 'r') as pastf:

       for line in pastf:

           cells = line.split(",")

           row = []

           for cell in cells:

               if(cell.lower().strip()=="customer number"):

                   break

               else:

                   row.append(cell.strip())

           if  len(row)>0:

               file_contents.append(row)

   return file_contents

past_file_path="F:\\Past Customer.txt"

proposed_file_path="F:\\Proposed Customer.txt"

merged_file_path="F:\\Merged File.txt"

merge_file(past_file_path,proposed_file_path,merged_file_path)

Predictive Algorithms Identify one use/application in which tprediction might cause significant ethical harms.

a. True
b. False

Answers

I do believe this would be true.

Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer the following [3] a) What are the security risks for which a customer needs to be careful about? b) What kind of infrastructural set up will be required to set up a cloud? c) What sort of billing model will such customers have?

Answers

Answer:

perdonnosee

Explanation:

What happens when a dataset includes records with missing data?

Answers

Answer:

However, if the dataset is relatively small, every data point counts. In these situations, a missing data point means loss of valuable information. In any case, generally missing data creates imbalanced observations, cause biased estimates, and in extreme cases, can even lead to invalid conclusions.

It makes data analysis to be more ambiguous and more difficult.

Missing data is simply the same as saying that there are values and information that are unavailable. This could be due to missing files or unavailable information.

A dataset set with missing data means more work for the analyst. There needs to be a transformation in those fields before the dataset can be used.

Generally speaking missing data could lead to bias in the estimation of data.

A data scientist is a data expert who is in charge of data. He performs the job of data extraction, data analysis, data transformation.

read more at https://brainly.com/question/17578521?referrer=searchResults

Briefly describe the fundamental differences between project-based and product-based Software Engineering.

Answers

Answer:

Product-based companies make a specific product and try to market it as a solution. But project-based companies create a solution based on many products and sell it as a packaged solution to a particular need or problem.

Explanation:

hope this helps

Product firms make and try to market a certain product as a solution. But projects are creating a solution based on many product lines as well as selling them for specific needs or issues as such is.

Project-Based Software Engineering:

Software developers based on projects follow a service-oriented strategy. At one time, not only software but multiple projects are being developed, operated, and delivered. It accomplishes a software development process from requirement collection to testing and maintenance. It is carried out in compliance with implementation methods or specified period for achieving the software package meant for use.

Product-Based Software Engineering:

A product-based business is a venture that produces a product that may or might not have software connections. Even before resulted in a demand, it will create or design its goods or applications ahead of time. Once the product is produced or applied, it is opened up for market use and only works if a client meets specific requirements and needs. It is used to start creating some goods including Oracle, Adobe, Samsung, etc.

Learn more:

brainly.com/question/14725376

How can using Prezi software for a presentation allow the presenter to better respond to audience needs?

Answers

Answer:

The description of the given question is summarized in the explanation section below.

Explanation:

Prezi makes things simpler to move around freely from one location to another even though you may pass through slides conventional standard edition presenting. If users spend nearly the audience's listening that would be very useful.Unless the organization's crowd looks puzzled or makes a statement, you may backtrack to that same topic without navigating several slides expediently.

Discuss at least five ways of practicing good device care and placement

Answers

Answer:

The points according to the given question are provided below.

Explanation:

Batteries are quite a highly crucial part of EVs and should be handled accordingly.Whenever a part becomes obsolete, it should have been substituted every year using an innovative version.Before using an electric car, it should have been fully charged and ready to go.Within a certain duration of time, the gadget needs to be serviced again.Be sure to keep your mobile device or another gadget in such a secure location.

1) Design a class named Axolotl that holds attributes for an axolotl's name, weight, and color. Include methods to set and get each of these attributes

2)Create a small program that declares two Axolotl objects (using the class above) and sets each axolotl's name, weight, and color attributes. The program must also output each axolotl's name, weight, and color after they are set

Answers

what subject is this exactly?

Brandon has configured one of the applications hosted on his cloud service provider to increase the number of resources as needed. Which of the following describes this capability?

a. Continuity
b. Adaptability
c. Vertical scaling
d. Horizontal scaling

Answers

Answer:

The description of this capability is:

d. Horizontal scaling

Explanation:

The capability that Brandon has achieved is horizontal scaling, which involves the increasing of the resources of cloud applications to meet his increasing demand for cloud services.  Vertical scaling involves the addition or subtraction of power to a cloud server, which practically upgrades the memory, storage, or processing power.  But to scale horizontally, more resources are added or subtracted.  The purpose of horizontal scaling is to spread out or in the workload of existing resources and either increase or decrease overall performance and capacity.

Write a demo test to verify the above Rectangle object accessible from demo test main program and can execute display() method to output.

Answers

Answer:

Explanation:

The Rectangle class was not provided in this question but after a quick online search I was able to find the class code. Due to this I was able to create a test code in the main Method of my program to create a Rectangle object and call it's display() method. The Test code and the output can be seen in the attached image below. While the code below is simply the Main Test Program as requested.

class Brainly {  

   public static void main(String[] args) {

       Rectangle rectangle = new Rectangle(20, 8);

       rectangle.display();

   }

}

In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer. Name them and explain the significance of each in the working of the computer. Why is a 64 bit processor better than a 32 bit processor

Answers

Answer:

CPU, RAM, and Storage

Explanation:

The three hardware components that are inside every computer and are essential for it to function are CPU, RAM, and Storage (HDD, SSD). CPU is basically the brain of the computer where everything is calculated. The RAM is the memory that stores temporary information. Lastly, the Storage device is where the entire operating system and persistent data will be saved and accessed from. 64-bit processors are better simply because they can access more memory at any given time and therefore allows it to manipulate more data at the same time.

CC stand for.....in the email platform?

Answers

CC stands for Carbon Copy in emails.

Along with the "To" field of an email, you will usually have a place to enter email addresses in a CC field. CC stands for "carbon copy."

Hope this helps! Please mark me as brainliest!

Have a wodnerful day!

Write a line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.

Answers

Answer:

A line of code to create a constant called MAX that will hold the size of an array that can store up to 25 decimal values. Separate each item with 1 space, and end the line with a semi-colon.

Here,

const int MAX = 25;

Leo is planning the new backup strategy for a subsidiary his company is purchasing that does not currently have a backup strategy in place. He decides that a full backup should be run once per week. Once per day, everything that has changed since the last full backup will be archived. Once per hour everything that has changed since the last backup of any type will be backed up. Which of the following describes the backups that will be run every hour?

a. Differential
b. Variable
c. Incremental
d. Flexible

Answers

Answer:

C. Incremental backup

Explanation:

An incremental backup is a type of backup where the succeeding copies of the data is made up of only those positions that have changed since the previous or prior copies were made. Such backups are desired since they limit the usage of space for storage and these types of back ups are faster to do that the differential backup.

When we bring this explanation to this question, we can easily see that the backup that is being carried out is done on everything that has changed since the last backup (previous backup). Therefore this is an incremental backup.

List the components of a typical operating system and summarize the role of each in a single phrase.

Answers

Answer:

The answer is below

Explanation:

There are several components of operating systems, this may be based on the specific types of Operating systems. However, here are some of the major components.

1. Kernel: it delivers the primary level of control on all the computer peripherals.

2. Process Execution: it serves as a connection between the hardware and application program

3. Interrupt: it provides a dependable technique for the OS to transmit & respond to their surroundings.

4. Memory Management: it regulates main memory and then moves processes between disk & main memory during implementation.

5. Multitasking: it interprets the activities of many independent computer programs on a similar computer system.

6. Networking: it defines the interaction of processor through communication lines

7. Security: it protects the activities of other processes going in the system

8. User Interface: it provides permission for a computer operator to get the information.

In MS_Excel , assume you have data base of employees with their ages,How you could checked the employee is continuous in work or not depending on his age? A) By using AND function. B) By using IF function. C) By using OR function. D) By using IF and AND functions

Answers

Answer:

C) By using OR function

Explanation:

Given

Employees database

Required

Check for employees that are continuous in work or not depending on age

The solution to this question lies in the question itself.

From the question, we are to check for

....employees that are continuous in work or not depending on age

Notice that the question does not imply the usage of an if-function but, the usage of an or function as indicated by the text in bold.

So.

If an employee is continuous in work, the function will return true

If an employee does not depend on age limit, the function will return true

The function will return false, if both conditions are not true

A technician is setting up a VM for use in testing software deployments. The VM is offline, but the hypervisor is not. Which of the following settings should the technician change to resolve this issue

Answers

Answer:

The answer might be C.

Explanation:

Virtualization software (hyper-v, vm ware, virtual box) has a power button to power on the virtual machine, so in the real world you would press the power button. But the virtual CPU is the closet thing to a power button.

the right answer might be c

The enhanced for loop _____ Group of answer choices reduces the number of iterations necessary to visit all elements of an array prevents incorrectly accessing elements outside of an array's range can be used to replace any regular for loop while yielding less code creates a copy of an existing array and iterates through the copy's elements

Answers

Answer:

prevents incorrectly accessing elements outside of an array's range.

Explanation:

The enhanced for loop prevents incorrectly accessing elements outside of an array's range. This type of loop is also called a For Each Loop. This is because this loop automatically loops through each element in the given array and grabs that element, then it performs whatever instructions are inside of the loop's body to that element before moving on to the next available element. This way there is no numbered indexing that needs to be provided and therefore prevents the loop from accidentally trying to access an index that does not exist in the array.

1. You purchase a new desktop computer that does not have wireless capability, and then you decide thar you want to use a wireless connection to the internet. Give two solutions to upgrade your system to wireless.
2. You are replacing a processor on an older motherboard and see that the board has the LGA1155 socket. You have three processors on hand: Intel Core i3-2100, Intel Core i5-8400, and Intel Core i5-6500. Which of these three processors will most likely fit the board? Why?a. 4.b. 5.c. 6.d. 7.

Answers

Answer:   1.)  You can use a USB WiFi adapter, install a dedicated PCIe WiFi card, or upgrade to a new motherboard with built-in WiFi. (That's three solutions but just want to give you flexibility with your problem.)

Answer:    2.)  None of the processors would fit because they all have different series sockets. (The i5 processors have LGA1151 sockets and the i3 has an LGA1156 socket.)

Explanation: 1.)  Usb WiFi adapter, dedicated PCIe WiFi card, OR a new motherboard with built-in WiFi

                     2.)  None of the processors work

Calculate the number of telephone
towers required to cover the entire
Country asurning the entire country is
interconnected to provide network
coverage

Answers

Answer:

yho

Explanation:

hayi no ntwana.... lala boy

Viết chương trình nhập vào họ tên của bạn rồi in nội dung chuỗi đó lên màn hình.Ví dụ:Nếu họ tên nhập vào là: NGUYEN BINH MINH thì kết quả màn hình như sau

Answers

Why people spam this nugen thing

The development of the modern computer system has been evolutionary. Discuss this phenomenon and further discuss how current trends in computing would impact future computer systems development

Answers

Answer:

The modern computer system has been evolutionary. Modern computers have allowed for us to complete hard tasks rather easily. With modern computers, we are able to calculate advanced equations with the click of a button. Trends in computing like RTX can rapidly improve performance, rendering, and tons of other graphical heavy actions. In September of 2018, we got the first RTX card, now in 2021, RTX has become exponentially better than what it was in 2018. With the modern computers comes quantum computers. Quantum computing is estimated to be 100 million times faster than any modern computer. IBM, the company to make the first computer stated that we are in the decade of quantum computing. And who knows? Maybe quantum computing will come sooner rather than later.

Explanation:

You probably should modify this a little so you don't get in trouble. I researched each topic I put into this for about an hour so I hope this is what you need. If it isn't, please don't hesitate to tell me what I didn't add or what went wrong.

Have a good day :)

a. Daily Life Magazine wants an analysis of the demographic characteristics of its readers. The marketing department has collected reader survey records containing the age, gender, marital status, and annual income of readers. Design an application that allows a user to enter reader data and, when data entry is complete, produces a count of readers by age groups as follows: younger than 20, 20-29, 30-39, 40-49, and 50 and older. b. Modify the Daily Life Magazine program so that it produces a count of readers by gender within age group-that is, under-20 females, under-20 males, and so on. c. Modify the Daily Life Magazine program so that it produces a count of readers by income groups as follows: under $30,000, $30,000-$49,999, $50,000-$69,999, and $70,000 and up.

Answers

Answer:

uh

Explanation:

Keely has an automation tool in place that runs a number of different processes for her and has for the last two years. All of a sudden it stops working and generates an error message that the account has been locked. Which of the following is the best possible reason why?

a. The password has expired.
b. The IP address of the server the process is typically accessing has changed. *
c. The ACL with the allowed list of users has changed.
d. Someone has tried to hack into the system using that account.

Answers

Answer:

b. The IP address of the server the process is typically accessing has changed

Explanation:

IP address stands for Internet Protocol address. It refers to a numerical value which is assigned to a every device which is connected to a computer network using the internet protocol for any communication.

Every device is allotted a unique IP address number.

In the context, Keely who works on an automation tool suddenly gets an error message that the account has been locked. This is mainly due to the changed in the IP address of the server that accesses the process.

The account gets closed or clocked whenever the IP address of the server changes.

Therefore, the correct option is (b).

which is better microprocessor or vacuum tube explain​

Answers

Answer:

explain the role importance of communication in economic development of Nepal?

Other Questions
Which congruence theorem can be used to proveABR = RCA? Name 3 Historical events that had an effect on American literature 1. The features of the British culture Aliya made 8 liters of punch for a party. Did she make more than, less than, or exactly 800 milliliters? Explain your answer The analog computer deals directly with The maximum and minimum Values of a quadratic function are called as______of the function. A midsummer nights dream love is patient love is kind. It does not envy, it does not boast, it is not proud. It is not rude, it is not self-seeking, it is not easily angerad, it keeps no record of wrongs. Love does not delight in evil but rejoices with the truth. It always protects always trusts always hopes, always perseveres Love never fails Is what Shakespeare portrays in the play truly the love that we, as Christians, understand? If yes, how? If not, why not? look at the image below what is the term for female reproductive cell ? Your friend Araceli is writing to you, remembering what her family vacations used to be like. Helo me fill in the blanks in the email with the imperfect tense of the verbs in parentheses.Cut and paste from here : Cuando yo (1)(ser) nio, mis padres y yo (2)(ir) de vacaciones todos los veranos. Ellos (3)(preferir) hace el ecoturismo. Mi padre siempre (4)(decir) que es importante cuidar la naturaleza. Yo frecuentemente (5)(caminar) por los bosques mientras mis padres (6) (buscar) plantas y animales exticos. Los guas tursticos en estos viajes normalmente (7)(prohibir) que tocramos las flores. Te recuerdas cmo t siempre (8)(querer) venir con nosotros y cmo nosotros siempre (9)(hablar) con tus padres pero que ellos siempre (10)(negar)? Pobre t. By Using the following schema, answer the following SQL queries and commands: Product(P_code.P_name, P_price, P_on_hand,vend_code) Vender(vend_code, vend_fname, vend_areacode, vend_phone) 1- find the venders names who sell products in TN-5 area and their names include "dan". 2- find the code, name and vender code of product that has price between 1500S and 2500S and the product that has price between 48005 and 5600S. 3- Find the name, and code of venders who had 5 microwaves that has price less than 3500S. 4- Find the phone numbers of venders who sell Televisions. 5- Delete the records of venders who their first name is 'smith' Write 1 paragraph (at least 150 words) answering the following question:Do you think the eye for an eye justice found in Hammurabi's code is fair? Use at least two of the examples provided from Hammurabi's Code to justify your response.If any one finds runaway male or female slaves in the open country and bring them to their masters, the master of the slaves shall pay him two shekels of silver.If anyone is committing a robbery and is caught, then he shall be put to death.If a son of a paramour or a prostitute say to his adoptive father or mother: You are not my father, or my mother, his tongue shall be cut off.If a son strike his father, his hands shall be hewn off.If any one "point the finger" (slander) at a sister of a god or the wife of any one, and can not prove it, this man shall be taken before the judges and his brow shall be marked. (by cutting the skin, or perhaps hair.)If any one strike the body of a man higher in rank than he, he shall receive sixty blows with an ox-whip in public.If a man knock out the teeth of his equal, his teeth shall be knocked out.If a man strike a free-born woman so that she lose her unborn child, he shall pay ten shekels for her loss.If a barber, without the knowledge of his master, cut the sign of a slave on a slave not to be sold, the hands of this barber shall be cut off.If a slave says to his master: You are not my master, if they convict him his master shall cut off his ear. Who was most likely to support the emergence of absolute rulers due to the increased economic stability that emerged?A. The nobilityB. The clergyC. The middle classD. The peasants Sum of zeroes of polynomial 2x-x-3 is ? Full solved answers No spam If you want to melt a rock, even partially, there are three methods you can employ. Which of the following is not a way that melting is triggered in rocks in the Earth?a. adding waterb. adding heatc. releasing pressured. removing water Please help me answer this question? in a survey of 90 students, the ratio of those who work outside the home to those who don't is 6:4. How many students work outside the home according to this survey? SHOW ALL WORK! AND ONLY ANSWER IF YOU KNOW THE ANSWER! Nhm EXO c my thnh vin What are the reasons of vicious circle of poverty? What were problems faced by the allied powers after World War 2?