Yes, climate change is mainly caused by human activities. While there are other factors, people are by far the leading cause. Factories and vehicles pump harmful gasses into the atmosphere on a daily basis, depleting the ozone layer. The land and ocean are littered with trash and waste. To build homes and stores, more and more forests are cut down that bring homes to other animal and oxygen into the atmosphere.
Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and quantity sold how should she maintain the data
Answer:
store quantity in stock and quantity sold in a single cell
Explanation:
08. Consider the following four binary numbers.
11100111
10101010
11110000
11001100
Which of the following displays the numbers in ascending order?
(A) 10101010, 11001100, 11100111, 11110000
(B) 11110000, 11100111, 11001100, 10101010
(C) 11100111, 10101010, 11110000, 11001100
(D) 10101010, 11001100, 11110000, 11100111
Provide a written response that: describes in general what the identified procedure does and how it contributes to the overall functionality of the program write your response here explains in detailed steps how the algorithm implemented in the identified procedure works. Your explanation must be detailed enough for someone else to recreate it. Write your response here provide a written response that: describes two calls to the selected function. Each call must pass different arguments that cause a different segment of code in the algorithm to execute
These exercises are about a descriptive essay or a descriptive text. The purpose of a descriptive text is to:
Inform; and guide the reader's precision.What is a Descriptive Text?As with every essay or text, your document must have the following:
An introduction (where you state the purpose of the text)The body (where the major description takes place)The conclusion (where you summarize and highlight cautionary instructions).Usually, it helps to itemize, label, and number instructions.
Examples of Descriptive Texts are:
Standard Operating ManualsCar Manuals.Learn more about Descriptive Texts at:
https://brainly.com/question/3530147
These activities are about writing a descriptive essay or text. A descriptive text's objective is to, Instruct and direct the precision of the reader.
What is the Definition of Descriptive Text?The document, like any other essay or literature, must include the following:
a brief overview (where you state the purpose of the text)The body (where the major description takes place)The final word (where you summarize and highlight cautionary instructions).It is often beneficial to itemize, label, and number instructions. Descriptive texts include the following:
Car Manuals and Standard Operating Procedures
Visit to learn more about Descriptive Texts:
brainly.com/question/3530147
#SPJ4
how do I fix when it hits the second session it skips scanf.
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}
Answer:
scanf(" %c" ,&op); //entering operators such as + - \ *
Explanation:
put space before %c
What's better, adventure time or regular show?
Totally Regular Show!!!
what are computer networks
Answer:
A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.
Explanation:
:)
qbasic program to convert Nepali rupees into paisa
Answer:
INPUT "What is the amount of rupees you want converted into paisa"; rupees
paisa = rupees*100
PRINT paisa
Explanation:
done in QBASIC
the semicolon in the 1st line makes the question have a ? at the end. the rupees key word in the 1st line saves the input as a variable
then the second line multiplies by 100 since there are 100 paisa in 1 rupee
____ is a very fast network media. It contains multiple (sometimes several hundred) clear glass or plastic fibers, each about the thickness of a human hair. Each fiber has the capacity to carry data for several television stations or thousands of voice conversations, but each fiber can only send data in one direction. Data sent over a fiber-optic cable is represented by light pulses and is sent at speeds of up to trillions of bits per second
Fiber optic cable (FOC) is a very fast network media and it comprises multiple clear glass or plastic fibers.
What is a fiber optic cable?A fiber optic cable can be defined as a type of wired connector which are either made of glass or plastic and they are typically used for connecting one network device to another, so as to form a computer network and enable the continuous transmission of data between them.
In Computer technology, fiber optic cables (FOCs) are commonly produced through the use of several concentric layers of transparent material such as glass or plastic, with each having a slightly different index of refraction for light waves and about the thickness of a human hair.
Read more on fiberoptic cables here: https://brainly.com/question/116766
75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware
Malwares are intentional attacks on a system with the intent to do harm.
Cyberthreats may be intentional like a virus or unintentional like a fire or human error
Hope that helps!
One new and creative method companies are using to advertise is:
A. stealing people's identities and pretending to be their friend.
B. promoting their products in television advertisements.
c. advertising products on the websites people visit the most.
O D. awarding prizes to users who follow them on social media.
SUBMIT
Answer:
c. advertising products on the websites people visit the most.
Explanation:
starting a computer after it has been turned off is term as
Answer:
Booting
Explanation:
Which of these can be a problem for people with accessibility issues? Select 4 options.
using left-aligned text
using an image instead of text
using all uppercase text
putting two spaces after a period
flashing images
The option that has can be a problem for people with accessibility issues is flashing images.
What visuals can lead to seizures?There are different kinds of Triggers. In television screens or computer monitors this issue can occur as a result of a flicker or rolling images.
Note that some video games or TV broadcasts has rapid flashes or alternating methods of different colors and as such may have accessibility issues is flashing images.
Learn more about accessibility issues from
https://brainly.com/question/26848886
Answer:
using all uppercase text
putting two spaces after a period
using an image instead of text
flashing images
Explanation:
Those are the four answers.
Which discipline focuses on the design of computer hardware?
information technology
computer engineering
information systems
computer science
Answer:
Computer Engineering
Explanation:
People that work in the computer engineering field usually create hardware such as the CPU, PSU, RAM, GPU, SSD & a few more.
10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
There are different kinds of applications. Control objects control the flow of the application.
What works the flow of control in a program?In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.
They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.
Learn more about application from
https://brainly.com/question/23275071
HURRY IM TAKING A TEST, WORTH 50 POINTS
Bar graphs compare values across categories using BLANK to display their information Fill in the blank:
1 Lines
2 Colums
3 Maps
4 Circle
Answer: Colums
Explanation:
Quizlet
Answer:
the answer your looking for is 2/B columns
Explanation:
What are 4 componenetas llk computers have in common
Answer:
Input, storage, processing, and output.
Explanation:
hope this helps you
i really need the answer now!!
3. Which is the path through which an electric current flow? *
1 point
A. close circuit
B. electric circuit
C. parallel circuit
D. series circuit
4. Which of the following is a device that acts as an automatic switch that opens the circuit if too much current flows through it? *
1 point
A. battery
B. circuit breaker
C. switch
D. volts
5. Which statement is true about parallel circuit? *
1 point
A. All parts are connected in a single path.
B. Current flows through more than one path.
C. Same amount of current passes through each load.
D. One electrical device goes out, the rest will not work anymore.
6. Which of the following can cause electrical fire? *
1 point
A. Play with the switches.
B. Insufficient supply of current.
C. Excessive current may overheat the wires.
D. Turn off the appliances when nobody is using it.
7. How many volts of electric energy do the outlets in the Philippines commonly have? *
1 point
A. 50 to 100 volts
B. 100 to 150 volts
C. 110 to 150 volts
D. 200 to 220 volts
8. When a short circuit takes place, the fuse wires melt and break __________? *
1 point
A. battery
B. breaker
C. circuit
D. wires
9. Which of the following shows the proper way in using electricity? *
1 point
A. Use damaged appliances.
B. Use overloaded extension wires.
C. Turn off the lights when not in use.
D. Plug appliances when nobody left in the house.
10. Gemma ironed their clothes. She stopped it when she smells burnt wires. Why did she stop ironing the clothes? *
1 point
A. Check if the extension wire is in good condition.
B. Search any busted bulb or outlet.
C. Find the burnt wires.
D. All of these
Answer:
3. B.
4. B.
5. B.
6. C.
7. D.
8. C.
9. C.
10. D.
Explanation:
I hope I helped you.
python
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)
main.py
# Define your function here.
if __name__ == '__main__':
# Type your code here. Your code must call the function.
The program illustrates the use of loops .
Loops are used for operations that must be repeated until a certain condition is met.
How to write the program?The program written in Python, where comments are used to explain each action is as follows:
#This defines the int_to_reverse_binary function
def int_to_reverse_binary(integer_value):
#This initializes the string output
strNum = ""
#The following loop calculates the string output
while (integer_value > 0):
strNum += str(integer_value % 2)
integer_value //= 2
#This passes the string output to the string_reverse function
string_reverse(strNum)
#This defines the string_reverse function
def string_reverse(input_string):
#This reverses the string
strRev = input_string[::-1]
#This prints the reversed string
print("Binary number:",strRev)
# The main begins here
if __name__ == '__main__':
#This gets the decimal value
dec_val = int(input("Decimal value: "))
#This calls the int_to_reverse_binary function
int_to_reverse_binary(dec_val)
Read more about Python programs at:
https://brainly.com/question/24833629
Is this code object-oriented, or is it procedural? what clues in the code itself did you use to determine what kind of code it is?
based on your reading of the code, what do you think the code is creating or simulating? what are the "objects" in the code line, and to what "class" do they belong?
imagine you wanted to tweak the project so that the list produced by the program included teachers and kept track of how many years they have been working at the school. using the principles of inheritance and overriding, explain how you could take this code and quickly create the new programs.
how could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? propose at least one way to use "coding" or creating programs outside of computer science and explain how it uses coding-related concepts.
what are the benefits of having access to modern ides that earlier programmers wouldn’t have had?
An Object-Oriented code or coding refers to a technique of programming that utilizes the identification of classes of objects that are closely tied to the functions with which they are related.
What is a Procedural Oriented Code?This refers to a kind of programming language that utilizes a step-by-step method so as to break down a task into a set or a collection of factors or variables and routines or sub-routines using a set of instructions that are sequential.
Objects in programming refer to a type of abstract data that has a state and behavior. It is a specific instance of a class.
A class in programming is a templated definition of the techniques and variables of a certain type of object.
What are some of the principles and structures of coding?There are 10 principles of coding. Some of them are:
Some of these principles can be used in normal day-to-day activity and even in business. item 1 for instance can be used during communication. Effective communication is more effective when it is kept very simple.
It is to be noted that the code referenced in the question is unavailable hence the general answer.
Learn more about Object-Oriented Code at:
https://brainly.com/question/4560494
What is one major reason various industries have adopted the use of automated robotic assembly?.
The major reason various industries have adopted the use of automated robotic assembly is to increase manufacturing productivity.
What is automated robotic assembly?Automated robotic assembly is the use of automotive technology to operate different areas in the manufacturing industries.
Automated robotics are used to perform the following tasks:welding, assembly,shipping, handling raw materials, andproduct packing.The reason why various industries have adopted the use of automated robotic assembly is that it saves time and there is increase in the amount of products manufactured that when manually handled.
Learn more about automation here:
https://brainly.com/question/11211656
Which of the following best describes your sequence of actions when developing a web page?
Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file
Answer:
I think D
Explanation:
Answer:
B
Explanation:
Saving it, then editing it wouldn't load the new changes
but editing it than saving it, would load the new Changes
When much of her work was automated with a new computerized system, louisa became unsure of her ability to do her job. Nisa, her boss, has been mentoring her to improve her.
Answer:
self-efficacy
Explanation:
Nisa, her boss, has been mentoring her to improve her self-efficacy.
What is Computerized system?DNA polymerases create a complementary DNA strand to the initial template strand during DNA replication, which is the process at its most fundamental level.
To produce a replication fork with two single-stranded templates, DNA helicases unwind double-stranded DNA before polymerases do. By using replication techniques, a single DNA double helix can be transformed into two DNA helices, which are subsequently split into daughter cells during mitosis.
The main enzymatic processes that take place at the replication fork are well conserved between prokaryotes and eukaryotes.
Therefore, Nisa, her boss, has been mentoring her to improve her self-efficacy.
To learn more about Self efficacy, refer to the link:
https://brainly.com/question/28215515
#SPJ6
Encoding in the information processing theory is the process of _____
Encoding in the information processing theory is the process of inputting of information into the memory system.
What is encoding?Encoding is an act or a system method that is used in the inputting of information into the computer memory system.
It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.
Learn more about encoding from
https://brainly.com/question/3926211
In information processing theory, encoding is the process of inserting data into a memory system.
What exactly is encoding?Encoding is an act or a systematic method for entering data into a computer memory system.
It involves the storage and retention of encoded data. The Retrieval procedure follows encoding and is the act of retrieving information from memory. The process of converting thoughts into communication is known as encoding in information processing theory.
Learn more about encoding from this website.
brainly.com/question/3926211
#SPJ4
4. is the disappearance of the individual a bad thing?
Answer:
The program completed in a third of the time with six computers versus one computer.
Explanation:
how does salmon brown’s account compare to frederick douglass’s account? to what extent do they agree or disagree?
The approaches of John Brown and Frederick Douglass had some similarities and differences. When compared, the men were said to have fought for its eradication but were said to have used different drastic process.
They agree in terms of what they stood for but differs in terms of the approach used.
What is the role of the two men above?Note that Douglass as a writer, orator, and statesman was said to have been focused on changing some of the policy.
While Brown on the other had is known to be radical in nature , who was known to stand for violence. With the use of a small army, he was said to have pioneered some multiple rebellions and aided a lot of people escape bondage.
Learn more about bondage from
https://brainly.com/question/24513713
When preparing your taxes, what can possibly help
reduce the amount of taxes that you owe?
Stock and savings interest
Sharing what you earned on a W-2 or 1099 form
Having stock dividends
Credits and deductions
When preparing your taxes, what can help is Sharing what you earned on a W-2 or 1099 form.
What are some expenses that can be taken as a tax deduction?Note that a person's Office supplies, credit card processing fees, tax preparation fees, etc., are some expenses that are taken as tax deductions.
Conclusively, Taxes are some amount of money taken by the government from our income. By Sharing what you earned on a W-2 or 1099 form, one can know the amount you earn.
Learn more about taxes from
https://brainly.com/question/25783927
Answer:
When preparing your taxes, credits and deductions can possibly help reduce the amount of taxes that you owe.
Explanation:
the term used to describe a memory location whose value changes during the program execution is
Answer:
variable
Explanation:
A variable is used to store data and can be changed throughout your program.
Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode
Answer:
Network Sniffing
Explanation:
Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.
Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.
How is packet sniffing done?Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.
Packet sniffing tools such as WireShark and SmartSniff are examples.
Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.
For further details about Packet Sniffing click here:
https://brainly.com/question/14417640
#SPJ4
What happens when an auditory system and computing system are connected by abstraction?
A. They convert sound signals Into data that can be used to tell a device how to function.
B. They allow blological abstractions and computing systems to filter data.
C. They analyze data from both systems so only doctors can uno medical devices. D. They separate Input and output data from one another.
Answer:
It's A. They convert sound signals Into data that can be used to tell a device how to function.
Explanation:
Question 17 of 40
What should you do before an interview?
A. Come up with one or two questiono for the Interviewer.
B. Eat a large meal.
C. Study as if for a final.
D. Stay up late the night before trying to guess what the interviewer
will ask.
C.
Because when you are getting interviewed you need to first study up on what you'd say!
Answer:
I think A
Explanation:
because need a question before your interview