why would computer programmers want to use an object to change the instructions they already created in a computer program ​

Answers

Answer 1

Answer:

bank rupt

Explanation:

no money on your card lol have  a graey day dont wish for what your not willing to work for


Related Questions

PLEASE HELP ME!!!!!
In Python, an array is called a ______________.

Answers

Answer:

List

Explanation:

In python programming language, an array is also referred to as a sequence.

What are programming languages?

Programming languages are digital languages that help to create software and programs over computer and computers networks. Python is one such coding language, and is widely used globally.

In python, the arrays are representatives of a sequence, which may describe any data elements and are put into such sequence with proper index in a chronological order.

Hence, in a programming language like python, an array represents a sequence.

Learn more about programming languages here:

https://brainly.com/question/14379391

#SPJ2

If Tamya makes $1000.00 gross monthly income and her total payroll deductions are $294.00, what is her net income?

Answers

Answer:

$751

Explanation:

From the question we have the following information;

Gross income = $1000.00

Deductions =   $294.00

Now we know that;

Net income = Gross income - Deductions

Therefore;

Net income = $1000.00 -  $294.00

Net income = $751

Which of these is not a common type of programming design?
~object-oriented design
~structured programming design
~graphic design
~top-down programming design

Answers

Answer:

structured programming design.

Explanation:

Answer:

I can confirm its structured programming design

Explanation:

Type the correct answer in the box. Spell all words correctly.
Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use?
To prevent strain and key correctly, Ben should
his fingers gently over the keys with his wrist in a flat position.

Answers

Explanation:

Type the correct answer in the box. Spell all words correctly.

Ben has to type a long letter to his friend. What is the correct keying technique that Ben should use?

To prevent strain and key correctly, Ben should use his fingers gently over the keys with his wrist in a flat position.

The AND operator is a disjunction and the OR operator is a conjunction.

True
or
False

Answers

Answer:

True but it might be false but i think is true

Select all the steps needed to create a maintenance schedule. Identify individuals to perform the maintenance. Document or log maintenance that has been performed. Take an inventory of the equipment. Obtain test equipment if necessary. Define maintenance tasks. Review the manufacturers' manuals. Establish frequency of tasks. Run the defragmentation utility. Develop a reminder system.

Answers

Answer:

Maintenance planning and scheduling, arguably the most neglected functions of modern asset management, are at the heart of an effective maintenance management system. Through the use of work orders and a CMMS, maintenance planning covers the daily or weekly planning, scheduling and control activities to ensure that scheduled work is undertaken, and that available resources are being used optimally. Yet many organizations still struggle to make their maintenance planning and scheduling as effective as it should be.

Maintenance planning

Without planning and scheduling, the wrench-on time for a company is on average only 35%. That means that for every technician working an 8-hour day, only 2.8 hours of that day is spent working on assets. Implementing proper maintenance planning and scheduling, however, can increase the wrench time from 35% to 65%. At this level of efficiency, a technician working an 8-hour day will complete 5.2 hours of actual work. With 65% of the engineer’s time being used efficiently, only 35% of their time is wasted. This improvement would enable an organization to move away from a reactive (firefighting) state of maintenance, and improve overall workforce efficiency.

Explanation:

1. Identify the problem

The need for maintenance can be triggered by a failure, a noisy bearing or an oil leak. Once identified, the problem must be reported to the maintenance department. This is normally done through a work request so that planning and scheduling can take place.

2. Plan the maintenance task

‘Planning’ involves deciding on what exactly needs to be done, determining priority, and defining the sequence of activities and skills required. Ensure that all the resources, material, labor, contract services, specialist equipment, tools and information are available. There may even be a need for outside contractors, items to be purchased or work permits to be obtained, all of which must be arranged in advance.

A maintenance planning function is a critical tool for reducing downtime and maximising the value of preventive maintenance. The maintenance planner must therefore have the technical skills and equipment knowledge to do this planning.

3. Schedule the work

‘Scheduling’ involves deciding when to do the work. This will depend on the priority level of the task, and the availability of both the resources and the equipment to be repaired. Many organizations schedule maintenance for a specific period during the working week or month. Weekend maintenance is never desirable because, in many cases, suppliers are not available and personnel are expensive.

The legal requirements with regard to statutory inspections are generally quite rigid, so try and devise a 52-week maintenance plan at the beginning of each year. Review this plan periodically to improve the accuracy and quality of the information. Communicate the preventive and corrective maintenance requirements to production so that they fully understand the need for the maintenance window.

4. Allocate the task to specific people

Although this will depend on organizational arrangements, consider the following:

Allocate your maintenance personnel to specific areas or pieces of equipment

Ensure the allocated person has the skills to perform the task

Be very clear about the type of work that will be allocated to outside contractors

Where necessary, undertake hazard analyses to identify risks and formulate action plans to control access to high-risk areas; your plans should include hot work permits, confined space permits and lockout procedures.

5. Ensure the work is executed properly

It is usually the responsibility of the maintenance supervisor to confirm that the maintenance work meets the required quality standards, usually through selected planned job observations. The planner (or, in some instances, a maintenance scheduler) should monitor outstanding schedules or work requests to ensure that the planned work was actually done.

6. Analyze the problem and decide how to prevent it from happening again

Analyze the root cause of major failures and take corrective action to prevent recurrence. Corrective action could include training, a change to the preventive maintenance programme or equipment redesign. Breakdown or failure of the management process is often overlooked in a major failure. In those cases, corrective action may be a systems upgrade.

When all six of these foundational steps are implemented and combined correctly, maintenance planning can attain much greater levels of efficiency. This leads to important asset-related data and information being shared across the plant, and even across multiple plants. It’s not an overnight process though, so don’t give up if you think it might take too long. The benefits are well worth it.

Identify and eliminate problems quickly and effectively with How-to Guide: How to use a problem-solving A3 Report, an essential guide to compiling an A3 report

Imagine you are playing a video game like Super Mario or Sonic and you lose your last life. What are THREE distinct things that will happen once your lives become 0? Give three examples. Then put on your programmer's hat. Describe your examples using pseudocode; in other words, you don't have to use the exact language Scratch blocks would, as long as you write out each step in such a way that it's clear what the code would do.

Answers

Answer:

Three distinct things that would happen are

1) There would be a death animation played

2) GAME OVER text would appear

3) The game would most likely start over at the first level

Explanation:

The pseudocode:

1) Play death animation and music

2)Stop animation and music

3) Display Game over text

4) Remove game over text

5) Reset level

6) Open on beginning screen/level

A “drone” is:

A. A helicopter with four propellers.

B. Any vehicle used on a seek-and-destroy mission.

C. Any experimental test vehicle.

D. An unmanned aircraft.

Answers

D an unmanned aircraft because it is controlled remotely.

Sean works with large multimedia files. He needs to send a very large file to a client for comments. What utility should he use?


Reducer

File Compression

Cleaner

File Wiping

Answers

File wiping i believe

Do you think the constant use of the Internet for almost all information seeking is a good or bad thing? Explain.

Answers

good because you can get in touch with people . bad because wasting times and making lazy

* EMAIL*

What do you type in the “recipients” box

(A) The title of your email/summary of what you need

(B) The persons name you are sending an email to

(C) The question you are asking

Answers

Answer:

The correct answer is: (B) The persons name you are sending an email to.

Explanation:

"Recipients" are the people receiving the email whether it be one or multiple people. Those are the people that will be getting your email on whatever your sending your email about. Hope this helps you! :D

3.
What is the meaning of *.VBP.

Answers

Answer:

The meaning of VBP is Visual Basic Project

Answer:

visual basic projects thankyouu HAHAHAHA

because cute ako

What is the purpose of HTML?
A. to store data
B. to structure a document
C. to style a document
D. to add functionality

plz it a test

Answers

You can style and structure with it so it’s either one of those

can someone please help me answer this I can’t fail. tysm :)

Answers

Answer:

option d because of you. blaa

Explanation:

whu

WHAT ARE THE RISK OF DUST​

Answers

Answer:

over heating

Explanation:

in computers dust acts as a blanket which traps heat, excessive heat causes components to burn up and short out

Search and read all phenomenon listed below and identify the ICT platform they used.

PHENOMENON

1. EDSA and Cardinal Sin
2. EDSA dos
3. Million people march against Pork Barrel
4. Disaster relief operations and mobilization​

Answers

Answer:

1. Radio broadcast

2. Text brigades

3. Social media and change website

4. Internet and text brigades

Explanation:

I'm having issues posting my answer. Please go through the attachment.

Answer:

1. Radio broadcast

2. Text brigade

3. Social media and change website

4. Internet and text brigades

Explanation:

ICT can serve as a medium through which change can be effected in a society.

1 EDSA and cardinal

The ICT used here was the radio.

2. EDSA dos

The ICT that was used her was the text brigades.

3. Million people march

The ICT used here was social media and the change website.

4. ICT used here is internet and text messaging.

Please I have provided background information to what caused these events. I typed my answers but the editor did not allow me post it.

Thank you.

is a keyboard a software?

Answers

Answer:

Yes

Explanation:

Because it's apart of software hope this helps

The hardware is all the tangible computer equipment, such as the keyboard and mouse. The software is what makes the hardware work or lets you get things done, such as writing documents with Microsoft Word or playing a Solitaire game.

Is a keyboard a software or hardware?
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, the software is the set of instructions that can be stored and run by hardware.


Hope it helps, have a great day!❤️✨

A website is unencrypted. Which tool can be used to stop the website’s traffic and analyze the information on it?

Answers

Answer:

Explanation:

Web analytics is the computation, amassing, study and reporting of web data for purposes of accepting and adjust web custom. although, Web analytics is not just a method for measuring web traffic but can be used as a tool for job and market study, and to determine and become better the effectiveness of a website. Web analytics applications can also help companies measure the broadcast advertising attacks. Web analytics support information about the number of users to a website and the number of page views. It helps measure traffic and popularity trends which is useful for market study.

whats wrong with my ps4 i cleaned it and it's still overheating and i have 3 fans for it

Answers

Answer: If your PS4 is overheating, It must be because of some dust you couldn't reach and piled up.

Explanation: What you need to do is take a can of compressed air and gently navigate it through the openings to the fan on your PS4. Go through and clean out the USB ports.

Which are two fundamental building blocks for creating websites?
OOOO
HTML
XML
CSS
DOCX
AAC

Answers

Hey the main coding languages for building websites are html. html is for the formatting . when CSS the other one is used for the style. we use CSS for style sheets and much more.  

if you think about it like a house html is the foundations and the walls and css is the paint.

Hope this helps.

definition of data redundancy​

Answers

Answer:

Data redundancy occurs when the same piece of data exists in multiple places, whereas data inconsistency is when the same data exists in different formats in multiple tables. Unfortunately, data redundancy can cause data inconsistency, which can provide a company with unreliable and/or meaningless information

Here is the answer to Edhesive 7.5 code practice


def GPAcalc(grade, weight):


grades = {"A": 4, "B": 3, "C": 2, "D": 1, "F": 0}


if weight == 0:


return grades[grade]


else:


return grades[grade] + 1


def Main(Random):

Print ("hi")


classes = int(input("How many Classes are you taking? "))


total = 0


for x in range(classes):


letter = input("Enter your Letter Grade: ")


user_weight = int(input("Is it weighted? (1 = yes 0 = no) "))


grade = GPAcalc(letter, user_weight)


total += grade


print("Your GPA score is: ", grade)


print("Your weighted GPA is a",(total/classes))

Answers

oh my god i could never do coding

What happens if an email server cannot find a matching username or the mailbox is full

Answers

Answer:

if the email server cannot find a matching username, you need to verify your email. I think at least.

Explanation:

Answer:

it do not send your e-mail

What is the correct syntax to output the type of a variable or object in Python?

Answers

Answer:

If a single argument (object) is passed to type() built-in, it returns type of the given object. If three arguments (name, bases and dict) are passed, it returns a new type object. If you need to check type of an object, it is recommended to use Python isinstance() function instead.

The correct syntax to find a variable type in python is type().

The type () function is used to return the data type or the type of variable. Inside the bracket you would have to input an object. The object could be a list, a string, a tuple, or an integer.

For example:

Lets say age = 50

Now we are to find out if the variable age is an, integer, a list, a tuple or a string. So we put the  variable age into the syntax.

type(age)

The output that would be returned is int. This tells us that the variable age is an integer. Because 50 is an integer.

read more at https://brainly.com/question/1748722?referrer=searchResults

if you hard working right now go to this EASY question


#BRAINLY and I will give you brainlist something I forgot what's it called for your hard work

Answers

Ok, where is the question so I can try my best?
Whats the question??? Lol

Where are methods listed in a UML class diagram showing three parts?
in the top third of the diagram
in the middle third of the diagram
in the bottom third of the diagram
anywhere in the diagram a lowercase m is shown

Answers

Answer:

the bottom third

Explanation:

Check out the exampe below.

swim() would be an example of a method.

PLZ HELP I NEED HELP 3RD GRADE MATH​

Answers

12/6 would be equal to 2
The answer would be ~12/6~ because 6*2=12 or 12 divided by 6=2

Hope this helps

Have a great day/night

What are some good digital habits?

Answers

Turn off notifications

Imagine you are part of a school newspaper or school yearbook club. What application software would you need in order to produce your work?

Answers

Answer:

MS-Word

Explanation:

MS-Word is the application software that is used for document creation or for word processing. It is the widely used software for content writing purposes and processing of words. It is available by Microsoft.

MS- Word is very useful when writing any paragraph or any article for a book or for any newspaper. We can modify or edit our content in the application software. It is basically a word processor that was developed by Microsoft company in the year 1983.

In the context, MS-Word is the best application software that is used to produced the work for the school newspaper or for the school yearbook club.

Help me get this
Also use these commands

Answers

sry for this but you shouldn’t post thsi again and put it closer cause no one can see the pic
Other Questions
PLEASE HELP Answer the following questions with complete sentences in French. Note the cues in parentheses.14. Que faut-il faire avant de faire de l'exercice? (stretch)15. Que mange-t-on l'aprs midi pour tre en bonne sant? (a healthy snack)16. Elle dit qu'elle a 21 ans. Est-ce qu'elle dit la vrit? (No, she's lying!)17. Avec quelle partie du visage parle-t-on?Translate the following sentences into French.18. We give (offrir) chocolate for Valentine's Day (la St. Valentin).19. To be healthy (en bonne sant), you have to exercise.20. I have a fever. I'm going to the doctor. What is 10/15 written in lowest terms? 17. Citing the internal references using subpoints while giving a speech _____. Help me please you will get the brianlest Disruptions to ________ has made it difficult to get information about the coup.Aferry serviceBmail deliveryCphone and internet serviceDair travel ASAP NO ROCKY... I NEED HELP BEFORE TIME RUNS OUT!!!!!!!!!!!! If segment DE is 12, what is segment BC? Which of the following is not true of mosses, liverworts, and hornworts?Question 11 options:They are non-vascular plants.They have true roots, stems, and leaves.They grow in moist places.They are small and low-growin Rearrange tiles on the board to represent equivalentexpressions.Which expressions are equivalent to 6 +(-x) + 2x + (-7)+ 2x? Check all that apply.Ox+ x + 6-7 + x+2x + 2 + xO 3-X + 2x - 4 + 2x-1-1-1-DX-1Ox+1Board sum: 6 + (-x) + 2x + (-7) + 2x PLZ HELP is this a fair spinner plz add explanation! :) If four cells went through mitosis at the same time how many daughter cells would be formed? Looking for someone who can take a look at this question for me: Imagine that you gets an email one morning . It appears to be from your bank . The email warns that someone broke ( 1) .......... your account . It says that you need to (2 )....... in to check some things . You click the link in the email . It takes you to a site that looks very much like your bank's . You enter your username and (3 ).............You submit the form . You've just been phished ! Phishing is a type of attack that happens over the Internet . Users receive an email or text message that seems like it came from a (4)............. source. These users are being (5 )............ They are interacting with dangerous hackers . The attackers copy trusted companies . They send users to web pages that look like the ones we use everyday . When users login or provide sensitive information , the attackers steal this data .1- into with for 2- signed signing sign 3- crossword password passroad4- trusted trust trusting 5- deceiving deceive deceived The area of the parallelogram below is ____ square meters.look at the pic bolow What shows up in a regular blood analysis? What is the position of the stars for a solar eclipse tooccur?Write it like this with their names. Astro - astro - astro How are the atmospheres on Jupiter and Saturn different than those on Uranus and Neptune? Please help will mark brainlist answer ! Find the length of ABAB = Myron Effriham is out of money. However, he will be paid in two days. Myron knows that he can cash a personal check with his employer at any time. He also has figured out that if he folds the check hes about to write many times and wets the crease over the electronic coding, the automatic check-routing machines will kick it out to be handled manually. Manual handling will cause at least another days delay before the check gets to his bank. Therefore, he could cash a check late today and, in effect, use his employers money to live on until payday. Is this ethical? Would anyone be injured by Myrons action? Is it illegal? Which of the following statements is false?Dissolving salt into water is an example of a mixture.The mass of one piece of paper is the same even after it is ripped in half and the 2 pieces are measured again.Increasing the temperature of water to a boil is a physical change.The formation of a precipitate is the only way to see if a chemical change has occurred.