Answer:
16
Explanation:
answer =3+2
answer =5+3
return 8 × 2
16 will print to the console after running this code segment. Therefore, option B is correct.
What do you mean by code segment ?A code segment, also known as a text segment or simply text, is a section of an object file or the program's virtual address space that contains executable instructions.
A character array segment that represents a text fragment. Even though the array is directly accessible, it should be treated as immutable. This allows for quick access to text fragments without the overhead of copying around characters.
In memory, the code segment functions normally as read-only memory and has a fixed size; thus, without the need for loading, it can generally be found in read-only memory (ROM) on embedded systems.
answer = 3+2, answer = 5+3
return 8 × 2
= 16
Thus, option B is correct.
To learn more about the code segment, follow the link;
https://brainly.com/question/20063766
#SPJ2
Read only memory is primarily used for?
Answer:
Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware. Software applications (like video games) for programmable devices can be distributed as plug-in cartridges containing ROM.
Hope This Helps!!!
What in a database table is an item of information with some characteristics?
Answer:
Attributes describe the characteristics or properties of an entity in a database table. An entity in a database table is defined with the ‘fixed’ set of attributes. For example, if we have to define a student entity then we can define it with the set of attributes like roll number, name, course.
Explanation:
CAN I GET BRAINLIEST
A ____________ protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.
Answer:
An internet protocol is software that provides or facilitates a connection in which no information is retained by either sender or receiver. The sender transmits a packet to the receiver and does not expect an acknowledgement of receipt. The recipient receives the packet without any prior connection setup.
What are the revised versions of water grinding mill and horse cart
The ____ method constructs a text string from Unicode character codes that are passed as arguments.
Answer:
The fromCharCode() method constructs a text string from Unicode character codes that are passed as arguments.
is the practice of using the internet to provide healthcare without going to a doctor’s office or hospital.
Answer:
Telemedicine refers to the practice of caring for patients remotely when the provider and patient are not physically present with each other. Modern technology has enabled doctors to consult patients by using HIPAA compliant video-conferencing tools.
Explanation:
Lists can not hold strings and numbers in the same list.
True
False
quadratic equation 4
In algebra, a quadratic equation is any equation that can be rearranged in standard form as ax^{2}+bx+c=0 where x represents an unknown, and a, b, and c represent known numbers, where a ≠ 0. If a = 0, then the equation is linear, not quadratic, as there is no ax^2 term.
HOPE IT HELPS:)
In the 1990s, DVDs replaced audiocassettes and floppy disks as the storage media of choice for music and computers. At which stage of the product life cycle is the DVD today
Answer:
Maturity
Explanation:
a ____________ is the intersection of a column and row in an excel spreadsheet.
Answer:
a cell is the intersection of a column and row in an excel spreadsheet.
which of the following are benefits of designing a scalable system? choose 3 options.
-guaranteed systems access for all users
- users may never know that a site has experienced tremendous growth
- ability to respond to user volume issues more quickly
- system will never need to grow again
-ability to maintain a high level of service for customers
What is the purpose of formatting charts?
changes the data set used for creating the chart
changes the look and feel of the display
changes the values in the data set
changes the type of chart used
Intro
Don
Answer:
Changes the look and feel of the display
Explanation:
Because you don't change the data nor the values in the char
And it does not change the type of chart.
__________ is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.
Answer:
bandwidth is the carrying capacity and speed of telecommunication networks that determine how much information can be sent and how fast it can travel over the networks.
Please fill in I give 50 points!!
# Heading (name, date, and short description) feel free to use multiple lines
def main():
# Initialize variables
numGuesses = 0
userGuess = -1
secretNum = 5
name = input("Hello! What is your name?")
# Fill in the missing LOOP here.
# This loop will need run until the player has guessed the secret number.
userGuess = int(input("Guess a number between 1 and 20: "))
numGuesses = numGuesses + 1
if (userGuess < secretNum):
print("You guessed " + str(userGuess) + ". Too low.")
if (userGuess > secretNum):
print("You guessed " + str(userGuess) + ". Too high.")
# Fill in missing PRINT statement here.
# Print a single message telling the player:
# That he/she guessed the secret number
# What the secret number was
# How many guesses it took
main()
Answer:
* explains the whole paragraph what ever that is * there
The type value ____ for the input element may cause modern browsers to validate entries to ensure that they are valid web addresses.
Answer:
url
Explanation:
When worksheets are grouped together you can change and create consistent _______ in all of the worksheets.
When worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets.
It should be noted that if an individual group a set of worksheets, then any changes that is made in the worksheet will have an impact on the other worksheet.
Therefore, when worksheets are grouped together, it's possible for the user to change and create consistent formatting in the worksheets. For example, if an individual wants to create a standard table, grouping them can help save the user a lot of time.
Read related link on:
https://brainly.com/question/25612069
which of these is not enumerated as a motivation to create accessible web content?
Answer:
Which of what?
Explanation:
when trying to solve a problem, bret uses a logical, step-by-step formula called
The logical, step-by-step formula that Bret uses when trying to solve a problem is called an algorithm.
An algorithm refers to a standard formula (procedures) which comprises a set of finite steps or instructions that is typically used for solving a problem on a computer.
This ultimately implies that, an algorithm is a standard, logical formula containing the step-by-step rules for proffering a solution to a particular problem on a computer.
In this context, Bret uses a logical, step-by-step formula called an algorithm, when trying to solve a problem.
Read more on algorithm here: https://brainly.com/question/24793921
Lauren is a network technician monitoring performance on the local area network (LAN). She becomes alarmed when the network utilization reaches 95 percent for a particular time of day. How does she know what the utilization is normally like
It uses network usage monitoring software to know the level of traffic on that local network.
We can arrive at this answer because:
Network monitoring is an important activity to avoid overloading or underutilizing a local network.This allows the network to be manipulated to promote good performance and provide adequate traffic to users.To know the level of use of a network it is necessary to use network monitoring software. An example of this type of software is the Capsa Network Analyzer, which also allows the elaboration of strategies to increase, stabilize or decrease network utilization.
More information:
https://brainly.com/question/8118353
Rohan has 50,000 that he wants to invest in two mutual funds for one year. Func low risk fund with 18% interest rate and Fund B is a higher risk fund 1% interest rate. Which feature of spreadsheets (Calc) will be help him to decide } Solver (b) Subtotal (c) Linking sheets d) Macros
The feature of spreadsheets that will help Rohan decide where to invest his money is;
Option A; Solver
Since he wants to find where to invest his funds for one year between the two fund types. This means in excel, he will make of what we call "IF function".
The "IF" function helps in making logical comparisons between a particular value and what you will expect and as a result, it implies that the "IF" statement can have two results. The first result of the IF function will be the one to show that the comparison is True while the second is to show the comparison is False.Now, in Microsoft Excel, we make use of an add-in program called "SOLVER" that is used for what-if analysis.
Solver is used to find the maximum or minimum value for a formula in the objective cell which is subject to constraints, on the values of other formula cells in that particular worksheet.
Read more at; https://brainly.com/question/15032995
From a data modeling point of view, _____ data refer to data whose values change over time and for which one must keep a history of the data changes.
Answer:
From a data modeling point of view, time-variant data refer to data whose values change over time and for which one must keep a history of the data changes.
If you suspect cyber crime what do you u do?
Answer:
Hey mate.....
Explanation:
This is ur answer.....
I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.
Hope it helps!
Brainliest pls!
Follow me! :)
Answer:
I would register a cyber crime FIR at the nearest local police station to report them. It is mandatory under Section 154, Code of Criminal Procedure, for every police officer to record the information/complaint of an offense, irrespective of the jurisdiction in which the crime was committed.
Explanation:
SOMEONE WHO ACTUALLY KNOW HOW TO DO THIS PLEASE DO IT AND SEND A SCREENSHOT I REALLY NEED IT FOR MY EXAMS AND DONT TROLL
Why is RAM considered as a volatile memory?
RAM (Random Access Memory) is called volatile memory, because in RAM memory gets erased on turning off the power.......
The command used to save a file for the first time and or to save a file with a new file name, location and formatT
cntrl s dummycntrl s dummycntrl s dummycntrl s dummycntrl s dummy
1. how did the prototype help you think about your idea?
2. what was frustrating about making a prototype?
[tex] \: \: \: \: \: [/tex]
1. how did the prototype help you think about your idea?
it can clarifies the things about the products as well as the user flow.2. what was frustrating about making a prototype?
There may be too much variation in requirements.hope it helps[tex] \: \: \: \: \: \: [/tex]
Which career path involves working directly with computer networks?
The career path involves working directly with computer networks are analyst, network manager, and data analyst.
What are Networking?Networking may be uncomfortable and nearly painful for a few people, however, it is something we have to all do. The truth stays that networking debts for kind of 70 percent of jobs landed via way of means of activity seekers.
Computer networking specialists are in demand, in keeping with a have a look at completed via way of means of IT Career Finder, community administrator activity is ranked in pinnacle 10 positions.
Read more about the networking :
https://brainly.com/question/1027666
#SPJ1
Answer: Computer systems administrator
Explanation:
John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat
Answer:
Evil Twins Attack
Explanation:
When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.
Write a program to input 6 numbers. After each number is input, print the biggest of the numbers entered so far.
Answer:
num1 = int(input("Enter a number: " ))
print("Largest: " + str(num1))
# num 2 #
num2 = int(input("Enter a number: "))
if num2 > num1:
print("Largest: " + str(num2))
else:
print("Largest: " + str(num1))
# num 3 #
num3 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3)))
# num 4 #
num4 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3, num4)))
# num 5 #
num5 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3, num4, num5)))
# num 6 #
num6 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))
Explanation:
In this exercise, using the knowledge of computational language in python, we have that this code will be written as:
The code is in the attached image.
We can write the python as:
num1 = int(input("Enter a number: " ))
print("Largest: " + str(num1))
num2 = int(input("Enter a number: "))
if num2 > num1:
print("Largest: " + str(num2))
else:
print("Largest: " + str(num1))
num3 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3)))
num4 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3, num4)))
num5 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3, num4, num5)))
num6 = int(input("Enter a number: "))
print("Largest: " + str(max(num1, num2, num3, num4, num5, num6)))
See more about python at brainly.com/question/13437928
What is the smallest unit of data in a computer? *
a) byte
b) terabyte
c) bit
d) bistable device
the smallest unit of data in a computer is bit