What is Code?
A) Rules of conduct
B) One or more commands designed to be carried out by a computer.
C) A pack between friends.
D) Edoc spelled backwords.

Answers

Answer 1

Answer:

In a class of statistics course, there are 50 students, of which 15 students  scored B, 25 students scored C and 10 students scored F. If a student is chosen at random from the class, what is the probability of scoring

not F?

Explanation:

Answer 2

Answer:

its b it's like opening multiple tabs


Related Questions

Please NEED HELP ASAP WILL MARK BRAINLIEST ONLY #8

Answers

Answer:

I think its A

Explanation:

Create a method named replaceCastMember that allows the name of a castMember at an index in the castMembers array to be changed. The method should take in 2 arguments, the int index and the String castMemberName. The method should return a true if the replacement was successful, false otherwise. (Note: Only update the castMember in the array if the index is valid)

Answers

Answer:

Explanation:

The following code is written in Java. It is a method that takes in the two parameters as requested and checks whether or not the index exists in the array. If it does then it replaces the String in that Index with the new castMemberName String parameter that was given. If the replacement is successful then it returns a True boolean, if not then it returns a False boolean. The array being used must be named castNames and have a global scope to be accessible by the method since it is not passed as a parameter.

public static boolean replaceCastMember(int index, String castMemberName) {

               System.out.println(castNames.size());

               if (index <= castNames.size()) {

                       castNames.remove(index);

                       castNames.add(index, castMemberName);

                       return true;

               } else {

                       return false;

               }

       }

apply the fade transition with smoothly effect to all slides in the presentation​

Answers

Answer:

12

Explanation:

its very long answer so that it is that

Write a C++ function, smallestIndex, that takes as parameters an int array and its size and returns the index of the first occurrence of the smallest element in the array. To test your function, write a main that prompts a user for a list of 15 integers and outputs the index and value of the first occurrence of the smallest value.

Answers

Answer:

Explanation:

The code in C++ is written as:

#include <iostream>

using namespace std;

int smallestIndex(int arr[],int size)

{

int min=arr[0],ind=0;

for(int i=0;i<size;i++)

{

if(min>arr[i])

{

min=arr[i];

ind=i;              NOTE: ind serves as a variable that is holding the smallest

}                                   element index of array

 

}

return ind;

}

int main() {

int arr[15];

cout<<"Enter 15 integers: ";

for(int i=0;i<15;i++)

cin>>arr[i];

for(int i=0;i<15;i++)

cout<<arr[i]<<" "<<endl;

int index=smallestIndex(arr,15);

cout<<"The position of the first occurrence of the smallest element in list is: "<<index<<endl;

cout<<"The smallest element in list is: "<<arr[index];

}

OUTPUT:

Enter 15 integers:

4

5

8

4

6

1

2

1

4

5

7

9

5

7

8

4   5  8  4  6  1  2  1  4  5  7  9  5  7  8  

The position of the first occurrence for the smallest element in the list is 5

The smallest element in the list is: 1

the processes of only seeing only some records frome data table is called as what​

Answers

Explanation:

For other uses, see Table. An example table rendered in a web browser using HTML. A table is an arrangement of data in rows and columns, or possibly in a more ... The first row is not . is called Html

how does a modem work​

Answers

Answer:

modem is a contraction of the words modulator-demodulator. A modem is typically used to send digital data over a phone line. The sending modem modulates the data into a signal that is compatible with the phone line, and the receiving modem demodulates the signal back into digital data.

Explanation:

Finish the sentence. If the IP address and MAC address are parameters of layer 3 and layer 2, respectively, a port number is a parameter of ______?

Answers

Answer:

Layer 4

Explanation:

MAC address works at the data link layer (layer 2) of the OSI model. Mac address allows computers to uniquely identify themselves in the network

IP Address is a logical address that works at the network layer of OSI model (layer 3) (actually the IP layer of TCP/IP model).

The port number works at the transport layer of the OSI model (layer 4).The port number uses sequence number to send segments to the correct application thereby ensuring they arrive in the correct order.

2. Write these functions definitions:
d) Function div2Numbers () that divides 2 integers.
Compile and test your function with the following main function:
int main()
1
char op;
cout<<"Enter + to add 2 integers\n";
cout<<"Enter - to subtract 2 integers\n";
cout<<"Enter x to multiply 2 integers\n";
cout<<"Enter / to divide 2 integers\n";
cout<<"Enter the operator required: ";
cin>>op;
switch (op)
{
case '+': add2 Numbers (); break;
case '-': sub2 Numbers (); break;
case 'x' : mul2 Numbers (); break;
case '/': div2 Numbers (); break;
default: cout<<"Invalid operator entered\n";
break;
}
a) Function add2 Numbers () that adds 2 integers.
b) Function sub2 Numbers () that subtracts 2 integers.
c) Function mul2Numbers () that multiplies 2 integers.​

Answers

Answer:

Complete the code with the following code segment:

void add2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

   cout<<num1+num2;

}

void sub2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

   cout<<num1-num2;

}

void mul2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

   cout<<num1*num2;

}

void div2Numbers(){

   int num1, num2;

   cout<<"Enter any two numbers: ";

   cin>>num1>>num2;

if(num2==0){

cout<<"Division by 0 is invalid";

}else{

   cout<<(float)num1/num2;}

}

Explanation:

The function added to this solution are:

add2Numberssub2Numbersmul2Numbersdiv2Numbers

Each of the functions

declares two integers num1 and num2prompt user for inputsgets user inputs from the user

For add2Numbers() function:

This line adds the two integer numbers and prints the result

   cout<<num1+num2;

For sub2Numbers() function:

This line subtracts the two integer numbers and prints the result

   cout<<num1-num2;

For mul2Numbers() function:

This line multiplies the two integer numbers and prints the result

   cout<<num1*num2;

For div2Numbers() function:

This if condtion checks if the denominator is 0

if(num2==0){

If yes, the following is printed

cout<<"Division by 0 is invalid";

If otherwise, the division is calculated and the result is printed

   cout<<(float)num1/num2;

See attachment for complete program

Write a function called no_you_pick. no_you_pick should have two parameters. The first parameter is a dictionary where the keys are restaurant names and the values are lists of attributes of those restaurants as strings, such as "vegetarian", "vegan", and "gluten-free".
#
#The second parameter is a list of strings representing of necessary attributes of the restaurant you select.
#
#Return a list of restaurants from the dictionary who each contain all the diet restrictions listed in the list, sorted alphabetically. If there are no restaurants that meet all the restrictions, return the string
#"Sorry, no restaurants meet your restrictions". Types of diet restrictions that exist in this question's universe are: vegetarian, vegan, kosher, gluten-free, dairy-free
#
#For example:
#grading_scale = {"blossom": ["vegetarian", "vegan", "kosher", "gluten-free", "dairy-free"], \
# "jacob's pickles": ["vegetarian", "gluten-free"], \
# "sweetgreen": ["vegetarian", "vegan", "gluten-free", "kosher"]}
#guests_diet = ["dairy-free"]
#no_you_pick(grading_scale, guests_diet) -> ["blossom"]


#Write your code here!
def no_you_pick(restaurants, preferred_diet):
result = []
for i in preferred_diet:
for key, value in restaurants.items():
# print(value)
if i in value:
result.append(key)
result.sort()
return result
return "Sorry, no restaurants meet your restrictions"

#Below are some lines of code that will test your function.
#You can change the value of the variable(s) to test your
#function with different inputs.
#
#If your function works correctly, this will originally
#print: blossom
grading_scale = {"blossom": ["vegetarian", "vegan", "kosher", "gluten-free", "dairy-free"], \
"jacob's pickles": ["vegetarian", "gluten-free"], \
"sweetgreen": ["vegetarian", "vegan", "gluten-free", "kosher"]}
guests_diet = ["dairy-free"]
print(no_you_pick(grading_scale, guests_diet))
**My code doesn't seem to work, any help with it I'll really appreciate it!**

Answers

Answer:

...

Explanation:

Create a SELECT statement that returns the count, average, max and min of the invoices submitted by each vendor, who has submitted more than one invoice. Order by the number of invoices in descending order. Should return 12 rows.

Answers

Answer:

SELECT Count(order_invoice) as number_of_invoices, Max(order_invoice) as maximum_invoice, Min(order_invoice) as minimum_invoice, Avg(order_invoice) as average_invoice

FROM vendor JOIN invoice ON invoice.id = vendor.id

WHERE order_invoice > 1

ORDER BY number_of_invoices DESC

Explanation:

The select statement of the SQL or structured query language returns twelve rows of four columns from the inner join of the vendor and invoice table in a database where the order_invoice column in the invoice table is greater than one. The result of the query is ordered by the alias column "number_of_invoices" in descending order.

Write a program that declares an array named myArray with 8 components of the type int. Initialize the array to 8 values that the user inputs (remember to prompt the user). Finally, pass the array as a parameter to a new function called filterEvens. This new function will display all of the even numbers in the array.

Answers

Answer:

#include <iostream>

using namespace std;

void filterEvens(int myArray[]) {

   for (int i = 0; i < 8; ++i) {

     if(myArray[i]%2==0){

         cout<<myArray[i]<<" ";

     }

  }

}

int main(){

   int myArray[8];

   for(int i =0;i<8;i++){

       cin>>myArray[i];

   }

   filterEvens(myArray);

   return 0;

}

Explanation:

The solution is provided in C++

#include <iostream>

using namespace std;

The function filerEvens is defined here

void filterEvens(int myArray[]) {

This iterates through the elements of the array

   for (int i = 0; i < 8; ++i) {

This checks if current element is an even number

     if(myArray[i]%2==0){

If yes, this prints the array element

         cout<<myArray[i]<<" ";

     }

  }

}

The main begins here

int main(){

This declares an integer array of 8 elements

   int myArray[8];

The following iteration allows input into the array

   for(int i =0;i<8;i++){

       cin>>myArray[i];

   }

This calls the defined function filter Evens

   filterEvens(myArray);

   return 0;

}

Implement a program called genes.py that does the following: a. Reads a DNA sequence t as command-line argument b. Reads strings (one by one) representing genes from standard input until EOF (use the functions stdio.isEmpty() and stdio.readString()), and for each string s i. Constructs a Gene object g from s ii. Writes g iii. Writes whether g contains the DNA sequence t or not c. Writes the percentage of genes that contain t, up to two decimal places

Answers

Answer:

Following are the code to this question:

import sys#import package sys

class Gene:#defining a class Gene

   gString = ""#defining a string variable

   def __init__(self, gString):#defining a constructor

       self.gString = gString#defining object to hold string value

gCount = 0#defining integer variable

mCount = 0#defining integer variable

t = input();#input value from user end

for s in sys.stdin:#defining for loop to check input value

   g = Gene(s)#defining g variable to pass value in class parameter

   gCount +=1#incrementing the value of gCount variable

   if(t in s):#defining if block to check input

       mCount +=1#incrementing the matchCount value

       print( g.gString,"True")#print value True

   else:#else block

       print( g.gString,"False")#print value False

   print("{:.2f}".format(mCount*100/gCount))#print percentage value

Output:

Please find attachment file.

Explanation:

In the code, a class Gene is declared, that defines a string variable geneString, and creates its constructor, and store the string variable value.

In the next step, a three-variable gCount, mCount, and t defined, in which variable "t" is used for an input value, and inside the for loop, it uses the conditional statement, that checks its value and increments the integer value, and print true or false as a message.

What is solar system​

Answers

Answer:

The sun together with the group of celestial bodies that are held by its attraction and revolve around it is called solar system.

Hope it helps :)

You are a network administrator for your company. A frantic user calls you one morning exclaiming that nothing is working. What should you do next in your troubleshooting strategy

Answers

Answer:

Explanation:

With these types of problems, you need to first try and Isolate the specific problem so that you can then come up with and apply a solution. Therefore, your next step should be to ask the client to explain what he is trying to do. Then ask him what he is doing and what is the first problem that he is running into. This will allow you to get a sense of what the client is trying to accomplish as well as his/her knowledge base on what they are doing in order to adapt your strategy accordingly.

Common uses of webinars include _____. Select all that apply.

A. corporate training

B. business meetings

C. distance learning

D. product demonstrations

Answers

Answer: distance learning

Explanation:

webinars are considered to be the best way that is currently used on a large scale to conduct online classes. it is referred to as the workshop, lecture, etc that conduct through the internet.  

it is defined as an interactive session that main aims to give, receive information in real-time. it consists of audio and video session between the listeners and speaker.

The common uses of the webinars incudes distance learning, corporate meetings, and product demonstration. Thus options B, C, and D are correct.

What is a webinar?

A webinar is an online event that is hosted by the organizations and companies and is broadcasted to the selected group of people by making the use of a computer and the internet.

These webinars can help in the launch of a product, can be useful for the distance learning purpose, and also help in business meetings.

Find out more information about the webinars.

brainly.com/question/20047596

What features do web development tools provide?

Web development tools come with several features to ease the process of building websites. Templates allow you to
experiment with a ___
Plug-ins allow you to___

Answers

The correct answer for the first choice is “variety of looks” and the other answer is “add features such as a payment system or spam blocker”
Explanation: platolivesmattertooyk?

Users report that the network is down. As a help desk technician, you investigate and determine that a specific router is configured so that a routing loop exists. What should you do next

Answers

Answer:

Determine if escalation is needed.

Explanation:

Since in this case, it has been determined that a specific router is configured in a way that a routing loop exists, the technician would further need to determine if the following issues are persistent;

having a switching loop on the networkgeneral router problemsrouting loopif there are broadcast storms.

You're typing up a document and come across the word sentient. You don't believe the readers of the document will know the meaning of the word, and you would like to substitute another word that's more common. What Word feature would you use to assist you in selecting a different word?

Answers

You would use a software tool that looks up the synonyms such as The Thesaurus

You would use a software tool that looks up the synonyms such as The Thesaurus.

What are the application?

Applications are type of software that are installed in a specific operating system of a computer that deviates from those system software installed together with the system itself. These third-party applications are necessary for other functions such as entertainment, business, leisure and other needs addressing of which the system software can't provide.

A networking software can be defined as a set of executable instructions (codes) that is typically designed and developed to instruct a networking device on how to perform a specific task or transmit data from one location to another.

System software has software that has been intended to serve as the foundation for other software. The Operating systems like the macOS, Linux, Android, and the Microsoft Windows are the examples of the system software, as are computational science software, game engines, search engines, industrial automation, and software as a service applications.

Therefore, You would use a software tool that looks up the synonyms such as The Thesaurus.

Learn more about software on:

https://brainly.com/question/892475

#SPJ3

What is the default zoom percentage in Word?

50%
100%
150%
200%

Answers

Answer:

The default zoom percentage in Word is 100%.

Answer:

100

Explanation:

Write a public member function removeRandom that removes a random element from the ArrayBag. This method should also return a boolean indicating whether an element was actually removed

Answers

Answer:

Explanation:

The following code is written in Java. It is a function that takes in the ArrayList called ArrayBag as a parameter and randomly removes one of the elements in the ArrayList. As long as the ArrayBag has at least 1 element it will return true otherwise it will return false.

public static boolean removeRandom(ArrayList ArrayBag) {

               Random rand = new Random();

               

               if (ArrayBag.size() > 0) {

                       int randomNumber = rand.nextInt(ArrayBag.size());

                       ArrayBag.remove(randomNumber);

                       return true;

               } else {

                       return false;

               }

       }

Darcy was working on a presentation on playing chess. Because she chose the Checkerboard animation for her slide title, she had to use the same animation for her bullet points.

True
False

Answers

The answer is true
Helene
the answers is true of this question

The logical way tables are linked is known as the database…

A. Schema
B. Primary Key

Answers

Answer:

B Primary Key

Explanation:

I think it is Primary Key but you can just make sure


4. In a relational database, entities are defined by
O A. values.
O B. columns.
O C. attributes.
O D. rows.

Answers

Answer:

C. attributes

Explanation:

A relational database is a database system that stores information within its servers. It has rows and columns that contain the data stored in them and which can be accessed at any time with the right administrative privileges.

In a relational database, entities are defined by their attributes. This is because an entity is the data that needs to be stored so, the attribute specifies that information and gives its value.

what is a computer ?​

Answers

Answer:

A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extremely wide range of tasks.

Explanation:


Well.......

A computer is a machine that can be instructed to carry out sequences of arithmetic or logical operations automatically via computer programming. Modern computers have the ability to follow generalized sets of operations, called programs. These programs enable computers to perform an extraordinary wide range of tasks.










According to Wikipedia ;))

What is your favorite game that you like to play ? ? ?

Answers

Answer:

Elder Scrolls online on xbox

Explanation:

Answer:

minecraft

Explanation:

Anyone know how to do this?

Answers

Answer:

bro it is simple click on text and click between the lines and u can write easily.

hope u mark me brainliest thank u ♡♡♡

yea you basically fill it in with the information that will be provided on another page

hope this helps : )

brainliest plz

A desktop system on your network has been compromised. Despite loading different operating systems using different media on the same desktop, attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of what type of rootkit

Answers

Answer: Firmware rootkit

Explanation:

From the question, since despite loading different operating systems using different media on the same desktop, and the fact that attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of firmware rootkit

Firmware rootkits are a threat to ones online safety. In this scenario, the firmware of the computer are targeted by the rootkits and not the operating system and malware are then installed which can destroy the router, or hard drive. This can be used by hackers.

____ Is an Internet service that allows users to send and receive short text messages In real time.

Answers

Answer:

SMS is the answer to this problem

Please need help ASAP will mark brainliest

Answers

Answer:

x8 negakation with a false

By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a ________ resource that can be configured and controlled by an upper layer control plane.

Answers

Answer:

Virtual

By dividing the control plane from the data plane, SDN offers the flexibility to view the entire data plane infrastructure as a Virtual resource that can be configured and controlled by an upper layer control plane.

Explanation:

The separating data plane (SDN) is used by users to hide the specifics of a device data layer so that all devices would be treated equally thereby representing the entire data plane as a  virtual abstract layer thus enhancing network efficiency.

The SDN work mainly on the Control and data plane separating both of the planes. Also, the SDN make networks more agile and flexible.

SDN provides the flexibility to view the entire data plane infrastructure as a

virtual resource that can be configured and controlled by an upper layer

control plane.

The type of resource which makes use of SDN to control an upper layer control plane is known as:

Virtual  

Based on the given question, we are asked to state the type of resource which makes use of SDN to control an upper layer control plane and how it is viewed for it it function effectively.

With this in mind, we can see that this can only be effectively done with a virtual resource so that the separating data plane can be effective in hiding the device data layer and test the other variables.

Read more about virtual resource here:

https://brainly.com/question/2680845

Other Questions
identify the slope and y-intercept of the function y=-5x+4 (brainlyest to correct answer) Help me with this question ASAP!!!!!!!!!!!! PLEASE HELP ITS URGENTWhat are the domain and the range of the graph?The domain is (,1) and the range is (,).The domain is (,) and the range is (,1).The domain is (,1) and the range is (,).The domain is (,) and the range is (,1). IN the book of I am every good thing Who said it to whom are they speaking too? Ayuda por favorrr lo necesito yaa Which of the following would have the least amount of inertia? Assume all the bags are the same size.bag of rocksbag of feathersbag of bricksbag of sand Decomposers use a process know as ? Time limits for filling claims promptly can be found in The caste system Reincarnation KarmaThe table lists characteristics of A. IslamB. HinduismC. JudaismD. Buddhism PLs HeLp! I WILL GIVE BRAINLIEST!!What is the theory of mercantilism? How are imports and exports affected? How did it influence European colonization efforts in Africa, North America, and South America? To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions If you're not satisfied with your fitness evaluation score, there's really little you can doabout it.Please select the best answer from the choices provided.True or False? . Sam Houston had three main goals during his first term as president. He wantedto (1) make peace with the Indians, (2) convince the United States to annexTexas and (3)What was his 3rd goal A garden hose fills a 2-gallon bucket in 5 seconds. The number of gallons, g (/), is proportional to the number ofseconds, t (x), that the water is running.What is the constant of proportionality? k=-help Cooper Construction Company had a contract starting April 2015, to construct a $18,000,000 building that is expected to be completed in September 2017, at a total estimated cost of $16,500,000. At the end of 2015, the costs to date were $7,590,000 and the estimated total costs to complete had not changed. The progress billings during 2015 were $3,600,000 and the cash collected during 2015 was 2,400,000. For the year ended December 31, 2015, Cooper would recognize gross profit on the building of:_____________ When Shawna speaks to Trish, she is thoughtful about the things she says and carefully considers Trish's reactions. Trish on the other hand blurts out her thoughts without much thought to how they are received. What best explains the differences between Shawna and Trish what abiotic factor is changing the ecosystem of Lake Washington,and how has this factor changed over time. In the Odyssey, why did circe turn Odysseus's crew into pigs? A desktop system on your network has been compromised. Despite loading different operating systems using different media on the same desktop, attackers appear to have access to that system every time it is powered up and placed on the network. This could be an example of what type of rootkit Write a paragraph summary about why it is important to be safe in a kitchen and why it is important to keep your kitchen clean. Include 3 ways you will keep your kitchen clean and sanitary in the future.