What is a placeholder for a piece of information that can change is called?
Answer:
Variable.
Explanation:
A placeholder for a piece of information that can change is called variable.
In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.
For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.
Hence, when you create variables in a function, you can can set the values for their parameters.
For instance, to pass a class to a family of classes use the code;
\\parameter Name as Type (Keywords) = value;
\\procedure XorSwap (var a,b :integer) = "myvalue";
.Explain how encrypting data during transmission protects it from being read by an unauthorised person who intercepts the transmission.
Answer:
Encryption is an effective and efficient technique used to prevent unauthorized access to informations transmitted over the internet.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
SSL/TLS are standard protocols that provides link encryption for the transmission of messages over the internet such as electronic mail (e-mail).
SSL is an acronym for Secured Socket Layer and it is one of the secured way of authenticating and encrypting data between a computer and the mail server.
In the case of TLS, it is an acronym for Transport Layer Security and it basically is used for providing authentication and encryption of data between two communicating systems on a network.
This ultimately implies that, SSL/TLS are standard network protocols that provides data integrity and privacy to users when communicating over the internet or networking devices as they're made to encrypt user credentials and data from unauthorized access. The SSL/TLS are an application layer protocol used for the encryption of mails sent over the internet, in order to protect user information such as username and password.
explain how do compare and contrast graphic organizers help you to synthesize information?
Answer:
Answer: Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set.
Explanation:
Given two or more sets of features of items, people, events, etc; compare and contrast graphic organizers help you to see what the sets have in common and what difference one set from the others, that is, what characteristics are unique from each set
How did you generate a random number for the user to guess? by using the built-in randint function by using the built-in random function by using the random method from the random module by using the randint method from the random module
Answer:
by using the randint method from the random module
Explanation:
The randint() method is a method or function in the random python module. It is used to get or return an integer number within a specified range.
To use the method, the module must be imported into the python file with the "import random" statement, then the method is referenced using dot notation and specifying the range of integer numbers.
syntax: random.randint(first_number, last_number)
Note that the last number in the range is inclusive in the selection.
Answer:
A. randint
Explanation:
I got it right on a quiz
Which of the following is NOT a standardized size for an editorial design?
11 inches by 14 1/2 inches
5 1/2 inches by 8 1/2 inches
8 1/2 inches by 11 inches
14 1/2 in by 24 inches
Answer:
14 1/2 in by 24 inches
Explanation:
Editorial designing belongs to the graphic design. It refers to the designing of the newspapers, books, magazines, and many more. Editorial designs are also made in online publications. Various online advertising agencies use them to provides ad online.
The main objective of an editorial design is to make the publication visually very interesting, attractive for the readers and should be easily understood by the reader.
There are various format sizes for publishing an item in editorial designing. The standard sizes are :
a).[tex]11 \ \text{inches by} \ 14 \frac{1}{2} \ \text{inches}[/tex]
b). [tex]8 \frac{1}{2} \ \text{inches by} \ 11 \ \text{inches}[/tex]
c). [tex]5 \frac{1}{2} \ \text{inches by} \ 8 \frac{1}{2} \ \text{inches}[/tex]
Why was the Internet first developed? Use details and information to explain your answer.
Answer:
for military purposes,
Explanation:
and then expanded to the purpose of communication among scientists. Unlike the telephone network, the Internet uses packet switching. Packet switching was invented by three different independent research groups around the world.
Explicar en qué sectores están divididos los procesos de producción y su importancia para el desarrollo tecnológico y económico del país. Indique dos ejemplos en cada sector
Answer:
Un sector económico es una rama de la economía en específico, caracterizada por englobar dentro de sí una serie de actividades interrelacionadas según cómo cada una contribuye al desarrollo económico del país. Una clasificación general popular de la economía es la división en los siguientes cuatro sectores:
1) Sector primario. El sector primario es el sector económico que abastece de materias primas y alimentos. Este sector abarca los sectores de agricultura, ganadería, caza, pesca y extracción de minerales. El procesamiento de estas materias primas se realiza en el sector secundario.
2) Sector secundario. Este sector se conoce como industria. Esto incluye todas las empresas y actividades que procesan las materias primas del sector primario. Los productos suelen ser revendidos al consumidor por el sector terciario.
3) Sector terciario. Este sector incluye los servicios comerciales: empresas que quieren obtener ganancias vendiendo sus servicios. El sector terciario incluye tiendas, catering, teatros, peluquerías, mayoristas, empresas de transporte, arrendadores, agencias de empleo, contables, abogados, consultores y empresas TIC.
4) Sector cuaternario. El sector cuaternario es el de servicios no comerciales, el único sector económico sin ánimo de lucro. Este sector incluye los servicios gubernamentales y los servicios subvencionados por el gobierno. Los ejemplos son hospitales, hogares de ancianos, cuerpos de bomberos, defensa, salud, trabajo social, educación y cultura.
Answer:
hola
Explanation:
Giving 5 stars, a Thanks, 80 points, and Branliest to whoever answers them correctly.
What refers to how a game’s player shapes what happens in their own personal game experience by making choices on how they play?
Group of answer choices
pseudostory
metagame
ludonarrative
iambic pentameter
Answer:
Explanation:
The answer is ludonarrative.
Please mark me brainliest.
You created a two-dimensional array with the following code.
A = [20, 'tennis', 'blue']
B = [15, 'soccer', 'green']
aList = [A, B]
How do you refer to 'green'?
Answer:
aList[1][2]
Explanation:
One can refer to the 'green' as per the given array, by aList[1][2].
What is an array?An array is a type of data structure used in computer science that contains a set of elements (values or variables), each of which is identified by an array index or key.
An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple.
Use the new keyword, a space, the type, the number of rows in square brackets, and the number of columns in square brackets to build an array, as in new int[numRows][numCols].
A 2D array has as many elements as its number of rows twice its number of columns.
Thus, aList[1][2] is the way to represent a two-dimensional array.
For more details regarding array, visit:
https://brainly.com/question/13107940
#SPJ2
Explaining AutoCorrect
How is the AutoCorrect feature useful in Outlook 2016? Check all that apply.
It checks for common typing errors.
It can automatically fix the error while you are typing.
It suggests email recipients that might be interested in your message.
It underlines words that need spelling and grammar corrections.
It ensures that you are emailing the correct recipients.
Answer:
1.
2.
4.
Explanation:
Had the same question
What is the output for the following program? numB = 2 while numB < 15: numB = numB + 5 print(numB) Output:
The following program is a while loop that will output the following data
7,12,17.
In the first iteration, the variable numB is 2, since 2 is less than 15, the program will run the command
numB = numB+5 and it will print 7
The second iteration is still valid because numB is now 7 and is less than 15, so the program will run the command
numB = numB+5 and it will print 12
The third iteration is still valid because numB is now 12 and is less than 15, so the program will run the command
numB = numB+5 and it will print 17
The fourth iteration is not valid because numB is now 17 and is greater than 15, so the program will not run the command
Learn more:
https://brainly.com/question/19344465
Answer: 7,12,17.
Explanation: got it right on edgen
Review the following definition of sustainable construction projects:
Sustainable construction projects demonstrate common sense applications of natural resources throughout the life of the project.
Sustainable projects also take into account the long-term effects on the environment, including how energy and materials are used and
recycled, which should be incorporated into the building itself.
Based on this definition, which of the following characteristics is not a characteristic of sustainable construction projects?
Energy and material efficiency in construction, operation, and maintenance.
Established technologies that have been in use for several decades
Low environmental impacts over the project's life cycle.
High ratio of renewable energy to fossil energy in construction, operation and maintenance,
Answer:
Established technologies that have been in use for several decades
Explanation:
Answer:I’m not sure
Explanation:
Software that requires excessive disk space or memory.
A. Malware
B. Excessware
C. Ransomware
D. Bloatware
Any device that uses light to read and write information.
A. Optical Drive
B. Peripheral Device
C. Laser Device
D. Optical Device
Answer:
the answer is optical drive
Explanation:
hope that helps thanx optical drive uses reflected light to read data.
In which TWO cases would you need to format a cell in a spreadsheet that contains a number? to make sure a formula includes it in calculations to change its appearance to make it easy to visually locate it to ensure no-one can use the number in calculations to ensure no-one can hide the column that contains it
Answer:
to make sure a formula includes it in calculations to change its appearance to make it easy to visually locate it
Explanation:
Microsoft Excel is a spreadsheet application used for data analysis and visualization. The worksheet of the excel file is tabular with rows and columns. A single block of the worksheet is called a cell and holds a single item located by the row and column label.
The particular cell can be referenced in a formula using the absolute reference operator '$' with the syntax "$column-label $ row-number". The background of the cells can also be formatted to have a different color.
In a PC, which of the following components stores the BIOS
A. CPU
B. RAM
C. ROM
D. Hard drive
Which of the following is a palette of colors, fonts and special effects which complement one another?
O Placeholders
O Theme
O Background
Slide Masters
Answer:
Theme
Explanation:
What might the Internet of Things do in the future?
The future of IoT has the potential to be limitless. Advances to the industrial internet will be accelerated through increased network agility, integrated artificial intelligence (AI) and the capacity to deploy, automate, orchestrate and secure diverse use cases at hyperscale.
describe a tsunami when it is far from the coast
I hope it is helpful for you ......
Mark me as Brainliest ......Tsunamis are marine phenomena, created by the abrupt displacement of large amounts of water into an aquatic formation. Tsunamis manifest as waves, which travel in the deep waters of the oceans at an average speed of 756 kilometers per hour.
While in deep water the tsunami, due to its characteristics there, is not considered a serious danger to the floating structures, reaching the shores has particularly devastating consequences.
Learn more in https://brainly.com/question/15964056
Three different numbers need to be placed in order from least to greatest. For example, if the numbers are ordered 9, 16, 4, they should be reordered as 4, 9, 16. Which of the following algorithms can be used to place any three numbers in the correct order?
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
If the first number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
A
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them.
B
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the last number, swap them.
C
If the first number is greater than the middle number, swap them. Then, if the middle number is greater than the last number, swap them. Then, if the first number is greater than the middle number, swap them.
Answer:A
Explanation:
QBasic commands any 10 with examples
Answer:
I haven't used qbasic in a quarter of a century, so my apologies if any of these are outdated.
I listed 13 here as I don't know what are being qualified as "commands" (I'm sure print is in there, but INT? LEN? these might be interpreted not so much as commands as functions)
PRINT prints text on the screen.
PRINT "How much wood would a woodcuhck chuck?"
INPUT gets text from the user
INPUT woodchuckwood$
INT casts a value as an integer
w = INT(woodchuckwood)
OPEN opens a file for input/output
OPEN "woodchuck.consumption" FOR OUTPUT AS #f
OPEN "woodchuck.consumption" FOR INPUT AS #f
CLS clears the screen
CLS
LOCATE specifies the cursor's location on the screen
LOCATE 10, 10
INKEY$ reads a character from the input buffer
a$ = INKEY$
LEN returns the length of a string
l = LEN(a$)
CHR$ takes an int and returns it's ascii value
$enter = CHR$(13)
ASC() returns the ascii value of a character:
$space = ASC(" ")
DO...LOOP repeats a loop until a condition is met:
x = 0
DO
x = x + 1
LOOP UNTIL x = 10
SHARED declares global values as being accessible locally
SHARED $username
SHELL executes an os command
SHELL "dir /w"
Explaining AutoCorrect
How is the AutoCorrect feature useful in Outlook 2016? Check all that apply.
It checks for common typing errors.
It can automatically fix the error while you are typing.
It suggests email recipients that might be interested in your message.
It underlines words that need spelling and grammar corrections.
It ensures that you are emailing the correct recipients.
Answer:
1, 2 and 4
Explanation:
Match the example with the type of collection.
{'casa': 'house'}
[3, 5]
(3, 5, 'dog')
Answer: First is a dictionary, second is a list, and third is a tuple
Explanation:
Complete the static method stringSearch, which returns a String that tells where the first occurrence of the characters (chr) were found ("The characters were found at ____ index.") or it says, "Those characters could not be found." The String to be searched (phrase) and the characters that are being looked for (chr) are passed in as arguments. (9 points) public static String stringSearch (String phrase, String chr) { ** Complete the code ** }
When heating a substance a phrase change will start to occur when the kinetic energy of the particles is blink the attractive forces between the particles
Answer:
great enough to overcome.
Explanation:
Kinetic energy can be defined as an energy possessed by an object or body due to its motion.
Mathematically, kinetic energy is given by the formula;
Where, K.E represents kinetic energy measured in Joules.
M represents mass measured in kilograms.
V represents velocity measured in metres per seconds square.
A conductor can be defined as any material or object that allows the free flow of current or electrons (charge) in one or more directions in an electrical circuit. Some examples of a conductor are metals, copper, aluminum, graphite, etc.
When heating a substance, a phase change will start to occur when the kinetic energy of the particles is great enough to overcome the attractive forces between the particles.
Basically, the phase change includes solid, liquid and gas.
What is the output?
X = 9 % 2
if (x == 1):
print ("ONE")
else:
print ("TWO")
Answer:
ONE
Explanation:
9 % 2 = 8 remainder 1
mod is asking for the remainder, so x = 1.
Since x equals 1, it will print ONE.
What is the missing line of code? >>> >>> math.sqrt(16) 4.0 >>> math.ceil(5.20) 6
Answer:
A math.pow reference
Explanation:
Answer:
from math import ceil
Explanation:
yes
When comparing systems software and application software, what is the main difference?
Answer:
it is a
Explanation:
i did the test
Which was the first computer network in the world
Answer:
ARPAnet in 1969
Explanation:
hope this helps :)
So my teacher asked us to predict who would win in a death match, and we could choose the two characters, so Alastor from Hazbin Hotel vs Blackhat from villinous, who would win?
Answer:
I think alastor from Hazbin Hotel.
Answer:
alastor
Explanation:
i mean alastor is a demon and blackhat we dont know if he is a demon or not but i mean alastor would win he took down a flying ship that was trying to kill them