Answer:
a. Set up the Google account on your tablet that you used to buy apps on your phone and then download the apps.
Explanation:
Consider this function comment. Which of the following options is recommended in your textbook? Computes the area of a cuboid. eparaml width the width of the cuboid eparam2 height the height of the cuboid eparam3 length the length of the cuboid ereturn the area of the cuboid double area(double width, double height, double length) double result - width +height 1ength; return result: A. The comments are adequate to describe the function. B. The lines need to end with semicolons like other C++ statements. C. The parameters should be described more completely. D. The eparaml, eparam2, eparam3 should be just eparam.
Answer:
A. The comments are adequate to describe the function.
Explanation:
C++ programming language comments starts with two forward-slash ("//") and can be written above a code statement or at the right-hand side of the code statements
The comments of the area() function with three parameters width, height, and length are adequate to describe the function as it does not need to end with a semi-colon.
Write a program that computes the minimum, maximum, average, median and standard deviation of the population over time for a borough (entered by the user). Your program should assume that the NYC historical population data file, nycHistPop.csv is in the same directory.
Answer:
import pandas as pd
df = pd.read_csv('nycHistPop_csv', skiprows=5)
NY_region = list(df.columns[1: -1])
select_region = input("Enter region: ")_capitalize()
if select_region in NY_region:
pass
else:
raise("Region must be in New york")
def pop(location):
# or used describe() to replace all like: print(df[location]_describe())
print(df[location]_min())
print(df[location]_max())
print(df[location]_mean())
print(df[location]_median())
print(df[location]_td())
pop(select_region)
Explanation:
Pandas is a python packet that combines the power of numpy and matplotlib used for data manipulation. It is good for working with tables that are converted to dataframes.
The nycHistPop_csv file is read to the code to a dataframe called "df", then the user input and the function "pop" is used to automatically generate the statistics of a given region.
solve the system of equations and choose the correct ordered pair.
4x+5y=22
2x+3y = 12
Answer:
(3,2) x = 3, y = 2
Explanation:
Originally, Java was used to create similar apps as what other language?
Perl
Python
CSS
Javascript
Answer:
Python
Explanation:
Took the test
Originally, Java was used to create similar apps as other languages, which as python. The correct option is b.
What are computer languages?The computer languages are Java and Python is in their conversion; the Java compiler converts Java source code into an intermediate code known as bytecode, whereas the Python interpreter converts Python source code into machine code line by line.
Curly braces are used in Java to define the beginning and end of each function and class definition, whereas indentation is used in Python to separate code into separate blocks.
Multiple inheritances is done partially through interfaces in Java, whereas Python continues to support both solitary and multiple inheritances.
Therefore, the correct option is b. Python.
To learn more about computer languages, refer to the below link:
https://brainly.com/question/14523217
#SPJ2
different between input and output device
Answer:
An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.
Explanation:
A Python programmer is writing a function definition. What syntax should be used?
def( statement ): functionName
argument1
argument2
argument3
def functionName( arguments ):
statement1
statement2
statement3
def functionName( statement ):
argument1
argument2
argument3
def( arguments ): functionName
statement1
statement2
statement3
Answer:
Python - Functions
Advertisements
A function is a block of orgaof code that is used to perform a single, related action. Functions provide better modularity for your application and a high degree ofAdvertisement
As you already know, Python gives you many built-in functions like print(), etc. but you can also create your own functions. These functions are called user-defined functions.
Defining a Function
You can define functions to provide the required functionality. Here are simple rules to define a function in Python.
Function blocks begin with the keyword def followed by the function name and parentheses ( ( ) ).
Any input parameters or arguments should be placed within these parentheses. You can also define parameters inside these parentheses.
The first statement of a function can be an optional statement - the documentation string of the function or docstring.
The code block within every function starts with a colon (:) and is indented.
The statement return [expression] exits a function, optionally passing back an expression to the caller. A return statement with no arguments is the same as return None.
Answer:
def functionName( arguments ):
statement1
statement2
statement3
Explanation:
what are the advantages of using a folder?
Answer:
1. easy access to files
2. better organization
Explanation:
Which of the following online activities seem appropriate for the workplace? (select all that apply) A.watching a webinar to learn new job skills
B.watching TV online
C. seeking donations to support your election to the Senate
D. reading press releases from your company's competitors
E. sharing career advice with your peers
F. sharing company secrets in a public forum
Answer:
A, D, and E
watching a webinar to learn new job skills
reading press releases from your company’s competitors
sharing career advice with your peers
Explanation:
got it right on edge2020
The online activities that seem appropriate for the workplace is sharing career advice with your peers.
What are virtual activities?The virtual activities are known to be any kind of online activities that is often done by people to make sure they have good and continued collaboration with other people.
Conclusively, Note that the use of online activities in the workplace should be the one that will help you and your peers to grow such as sharing career advice with your peers.
Learn more about online activities from
https://brainly.com/question/13171394
do you think your future career will continue to become more and more reliant on computers and is it a good thing to depend so fully on computers to help with work skills and careers
There are good and bad, some people rely on computers, and some people need him to help them find information.
What are the three categories of managerial decisions?
Top 3 levels of management
Strategic Production Planning
Technology decision
Capacity decisions
in the middle of the iteration, how should a team handle requirement changes from the customer
Answer:
Team may take up the changes in flight after discussing the overall impact with the Product owner
Explanation:
In the middle of the iteration, one of the best ways a team should handle requirement changes from the customer is to take up the changes in flight after discussing the overall impact with the Product owner.
This will make the customer well aware of the advantages and disadvantages that come with changes in the requirement, such that, the customer will be surprised about the final outcome of the iteration.
can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.
A)Global Communication
B)Social Media Platform
C)Internet
D)Technological Advancement
Answer:
Internet
Explanation:
just took the test and got A
Question 1 (1 point)
What is an advantage of the wireless option for peripheral?
1) ¡(X && Y )&& !X || W && Z
2) W || !(X || Z && Y)
3) !X || !Y || Z && X && !Y
4) X || Y || X && !Z && !Y
Answer:
???
Explanation:
Answer:
uhh
Explanation:
you spammed random stuff?
When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c. aborts program execution d. returns to the calling function
Answer:
sorry this is tought
Explanation:
no idea
jibran has made a presentation on save environment for a competition. his teacher suggested some changes.which view should be using following changes
Answer:
Jibran has set up five slides in his new presentation and is ready to enter some text. He wants to focus on entering text without having to think about other PowerPoint elements such as graphics, pictures, sound, and animation. The best method for Jibran to enter text is by using which feature of Microsoft PowerPoint?
For the function below, which variables have the same scope?
def square(numA, numB):
return numA ** numB
base = 5
power = 2
answer = square (base,power)
print(answer)
numA and power
power and base
numB and power
base and numA
Answer:
numB and power
Explanation:
Correct answer edge 2020
The variables have the same scope for the given function is power and base. The correct option is B.
What are variables?A variable in mathematics is a symbol and placeholder for any mathematical object. A variable can specifically represent a number, a vector, a matrix, a function, a function's argument, a set, or an element of a set.
A variable in computer programming is an abstract storage location with an associated symbolic name that contains some known or unknown quantity of information referred to as a value; or, to put it another way, a variable is a named container for a specific set of bits or type of data.
Because power and base are declared in the same container, they have the same scope. Because they are not present in a function, their scope is said to be global.
Thus, the correct option is B.
For more details regarding variables, visit:
https://brainly.com/question/17344045
#SPJ2
What is the minimum size of a data type, in bytes, to be impacted by system endianness. (Whole numbers only)?
Answer:
30
Explanation:
A data type must be at least 2 bytes in size to be affected by the endianness system.
What is endianness system?Endianness in computing refers to the arrangement of bytes inside a word of digital data stored in a computer's memory.
Big-endian or little-endian are the two main ways that endianness is stated.
The least significant byte in a word is kept at the largest memory location and the most significant byte is kept at the smallest address in a big-endian system.
The term "endianness" refers to the arrangement of bytes as they are stored in computer memory. Endianness is classified as big or little depending on which value is stored first.
Thus, for the endianness system to apply, a data type must be at least 2 bytes in size.
For more details regarding endianness system, visit:
https://brainly.com/question/14488920
#SPJ6
the formula to calculate percentage is the same as which other functions
Answer:
Division
Explanatio
Answer: everyone’s saying division, so I’m guessing the correct answer is division
Explanation: hope y’all have a blessed day
PLEASE I NEED HELP NOW!!!!!
Frank types in many numbers to calculate baseball statistics. To enter these numbers, he should use the _____.
Answer:
Numeric keypad
Explanation:
The numeric keypad has mostly only numbers so it would be more convenient for him.
Hope this helps!
Answer:
Numeric keypad on the right side of the keyboard.
Explanation:
Ap*x
kali linux os and window os who is the best
Answer:
Windows
Explanation:
It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.
Answer:
It is only what you prefer
Explanation:
im doing programming with kali and i have no problems. although windows is more user friendly and what people use on a day to day, kali is for pentsters mostly.
PLZ HELP!!!!!!!!! XC
what dose it mean if a circuit is hot to the touch
Answer:
The circuit is carrying more than it is supposed to and is overheating.
Explain
the three types of periodic
maintanance. .
Answer:
poop i think
Explanation:
Which of these are steps in the testing cycle? Check all of the boxes that apply.
testing the fixed code
releasing debugging version
fixing the error
reproducing and diagnosing the error
Answer:
A,C and D
Explanation: You're welcome
Answer:
A and D
Explanation:
What is the advantage of using a translation look-aside buffer (TLB), also called associative memory, in the logical-physical address mapping process? Explain how the logical-physical address mapping logic works using an inverted page table. When does the MMU detect page-fault? Explain four of the main steps for resolving page faults.
Answer:
A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data
B) When using an inverted table the logical-physical address mapping logic works as a hashing function by connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table
C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process
The four steps are :
The first step is to check on the memory address requested to make sure of a valid memory request.
The second step is to setup A free frame and a disk operation that is scheduled for getting the necessary page from the disk.
As the the I/O is been completed the processor table is been updated
Finally the Instruction will get restarted from the beginning indicating what might have been caused by a page fault.
Explanation:
A) The advantage of using TLB is that it is used for storing the recent transactions of the virtual memory to the physical memory and this is used for the sole purpose of fast retrieval of data
B) When using an inverted table the logical-physical address mapping logic works as a hashing function by connecting pieces of the hardware of logical address and getting them translated to the physical address. this hash function in turn generates the index to the frame table
C) The MMU detect page-fault when there is an exception been raised by the computer when a program is ran to access a memory page and this program is not mapped out by the MMU in the process
The four steps are :
The first step is to check on the memory address requested to make sure of a valid memory request.
The second step is to setup A free frame and a disk operation that is scheduled for getting the necessary page from the disk.
As the the I/O is been completed the processor table is been updated
Finally the Instruction will get restarted from the beginning indicating what might have been caused by a page fault.
Sptr is a pointer pointing to the beginning of an array called sarray. To access the value in sarray[3] by using the pointer, you would use:a) *sptr[*3] b) *sptr+3 c) sptr +3 d) *(sptr + 3)
Answer:
The correct option for accessing the value in sarray[3] is : d) *(sptr+3)
Explanation:
a) *sptr[*3] is wrong option because its syntax is not right it will give errors.
b) *sptr+3 is also wrong option because it will add 3 to the value of sarray[0].
c) sptr+3 is wrong option because it will only access the address of sarray[3] not the value it contains.
d) *(sptr +3) is correct syntax for accessing value in sarray[3] by using pointer
The task of handling how active processes are making efficient use of the CPU processing cycles is called_______?
Answer:
Scheduling.
Explanation:
A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.
Hence, the task of handling how active processes are making efficient use of the central processing unit (CPU) processing cycles is called scheduling.
In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.
Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).
Why is content knowledge as important as generalized critical thinking for Web Analytics and Web Intelligence reporting and insights? A) Because it's very difficult for students to apply critical thinking skills learned in one subject to another, even between different fields of science. B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst C) Everything is changing so fast that you need to keep up to date with the changes in the platforms that you use or are considering using for personal or organizational deployment. D) Content knowledge of Web Analytics is important because in a field like emerging technology that Web Analytics is still considered to be, new features of a Web Analytics platform can have a major impact on the ability to do the project and deliver value from it.
Answer:
B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst
Explanation:
The answer is option B. A good knowledge of content is very important and crucial due to the fact that knowledge stands at the center or the most important thing in the business sector.
Web analytics is a method of measuring, analysing and reporting web usage data. Content knowledge is a good understanding of the subject area. To understand web analytics, a going knowledge of the facts, theories and concepts are important if one wants to be an effective analyst.
Therefore b is the answer to this question.
Does anyone have any Edge(nuity) tips? Like how to skip videos and such.
Answer:
yes
Explanation:
it is quite easy chat me up and i will give u the link
Return-from-trap instruction returns into the calling user program while simultaneously reducing the privilege level back to ________ Select one: a. User mode b. Kernel mode c. OS mode d. CPU mode
Answer:
A. user mode
Explanation:
A computer system is a machine that is run by a series of programs that connect the virtual parts (software) to the hardware or electronic parts. The kernel is a computer program that connects the software and hardware of a computer system.
The kernel-mode has several privileges like I/O, interrupts and traps, etc. This mode is tapped by root or administrators to utilize these privileges. Unlike the kernel mode, the user-mode does not have these functions, so a return from the trap instruction (kernel) reduces the privileges back to the user mode.