Answer:
Developers are people who build a website's core structure using coding languages, while designers are more visually creative and user-focused. Developers use their programming knowledge to breathe life into the designer’s creative vision.
You could think of developers as construction workers, and web designers as architects – both necessary, but different, skill sets.
I hope this helped :D
Explanation:
Which background-repeat value represents this div?
repeat
repeat-y
repeat-x
no-repeat
Answer:
repeat-y ................ ..
8.10 Code Practice Question 3
Can someone please help cause this has me lost I took a picture of the question because that would be too much to try and type.
I’m sorry if the quality is bad I tried to get a good angle!
terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic",
"Reliability"]
def swap(arr, in1, in2):
w = arr[in1]
arr[in1] = arr[in2]
arr[in2] = w
print(terms)
swap(terms, 5, 1)
swap(terms, 2, 4)
swap(terms, 3, 5)
swap(terms, 5, 6)
swap(terms, 6, 8)
swap(terms, 8, 9)
print(terms)
This is how I interpreted the question. If I need to make any changes, I'll do my best. Hope this helps though.
The program is an illustration of lists and list manipulation
ListsLists are variables that are used to hold multiple values in one variable name
Python ProgramThe program in Python, where comments are used to explain each line is as follows:
#This defines the swap function
def swap(arr, pos1, pos2):
myList = arr[pos1]
arr[pos1] = arr[pos2]
arr[pos2] = myList
#This initializes the list
terms = ["Bandwidth", "Hierarchy", "IPv6", "Software", "Firewall", "Cybersecurity", "Lists", "Program", "Logic", "Reliability"]
#This prints the list elements
print(terms)
#This swaps the second and the sixth list elements
swap(terms, 5, 1)
#This swaps the third and the fifth list elements
swap(terms, 2, 4)
#This swaps the fourth and the sixth list elements
swap(terms, 3, 5)
#This swaps the sixth and the seventh list elements
swap(terms, 5, 6)
#This swaps the seventh and the ninth list elements
swap(terms, 6, 8)
#This swaps the ninth and the tenth list elements
swap(terms, 8, 9)
#This prints the list elements
print(terms)
Read more about lists and list manipulations at:
https://brainly.com/question/24941798
what class are you in?
can you help me in connection?
Answer:personal computer:)
Explanation:
which of the following types of correspondence is used to inform the reader of new information such as a policy change
Answer: Memo
Explanation: Have a good day, pls mark me brainliest <3
I'm working on an assignment for my computer science class (Edhesive) and when I run the code, there are no errors. But when I try to check it, it comes up with a Traceback error.
My code:
b = float(input("Enter Temperature: "))
Traceback (most recent call last):
File "./prog.py", line 7, in
EOFError: EOF when reading a line
Answer:
The error is because you wrapped the input in float. First record the input and then modify it.
Explanation:
b = input("enter temp:")
b = float(b)
please help, thank you
Answer:
radish spinach swiss chard
Explanation:
put each sentence in the correct place please :)
the first image matches with the last sentence.
the second image (fireworks) match with the first sentence.
the third image (rocket) matches with sentence two.
and the last image matches the third sentence.
Answer:
sentence 1 -> picture in box 2
sentence 2 -> picture in box 3
sentence 3 -> picture in box 4
sentence 4 -> picture in box 1
What is a resistor?
O A switch
O A light bulb
O A battery
Answer:
A Battery would be the correct awncer
PLS HELP BEING TIMED!!!
Complete the following sentence.
The basics of managing money such as balancing a checkbook and making a budget are _____
skills
Answer:
Bank Rate skills
Explanation:
because it is i believe
ASCII is a common format for the representation of characters in writing code. How many characters can be represented in the standard ASCII encoding
Answer:
A total of 128 characters can be represented in the standard ASCII encoding.
Explanation:
The American Standard Code for Information Interchange (ASCII) was created to make an international standard for encoding the Latin letters. In 1963, ASCII was received so data could be deciphered between PCs; speaking to lower and upper letters, numbers, images, and a few orders.
Since ASCII is encoded using ones and zeros, the base 2 number framework, it uses seven bits. Seven bits permits 2 to the power of 7 = 128 potential blends of digits to encode a character.
ASCII consequently ensured that 128 significant characters could be encoded.
PLEASE HURRY!!
Look at the image below!
hey plz help, and thanks
Answer:D im pretty sure
Explanation:im sorry if get it wrong So sorry ok just sorry
Match the terms with their definitions
Answer:
Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.
Hope this helps! :)
Nadia's productivity at work is being hurt due to the large quantity of unwanted e-mail she receives. What steps can she take to reduce the amount of e-mail she receives?
Carefully read and complete subscription forms.
Read e-mail messages every hour.
Stop using the Internet.
Forward spam to spam at uce.gov.
Stop posting her e-mail address on newsgroups.
Answer:
I think that carefully reading and completing subscription forms is important and could possibly lower the amount of emails.
Reading them every hour will only hurt her work ethic.
Stop using the internet won't help at all.
Forwarding the spam to spam at uce.gov could work because that's what the site was made to do.
Stop posting her e-mail address on newsgroups could definitely help.
I'm stuck between the 1st, 4th, and 5th one but its one of them.
How many answer choices are you allowed?
It is steps plural.
Answer:2,3,5
Explanation:
Sharing contacts is different from sharing a calendar. Use the drop-down menus to explain how.
1. You can share contacts with
outside the organization without publishing online.
2. You are not able to that somebody share their contacts with you.
3. Both calendars and contacts are shared in emails. For the latter, the recipient clicks
and selects from a list.
Answer:
anyone
request
open shared contacts
Explanation:
edge 2020
Answer:
anyone
request
open shared contacts
Explanation:
How do I create a videogame
Answer:
-Learn how to code
-Make Character
-Design
-Go to classes
-Go on video game platforms and make an video game(rblx is the best in my opinion)
-Play video games and see the scripts
-Decide what type of video game your making(horror, family game, battle game, etc.)
Explanation:
Answer:
By using programming languages such as Lua And JavaScript because they are the best for programming videogames
What are specific and relevant terms that will help you locate information using an internet search engine?
A: Keywords
B: Search Words
C: Smart Words
D: Unusual Words
please help me!!
Answer:
keyword
Explanation:
i got it right
What are the two negative impacts of computer technology to the society?
One negative is that people are getting very impatient. This is because people are getting used to things instantly coming up onto their screens. Another negative is that people are being manipulated more easily. Nowadays anyone can be an expert if they sound smart enough. Then they can spread their lies quickly to millions of people.
i need help, thank you
Answer:
uhh yes?
Explanation:
i think people can go on weeks without food, so a set of trays wit food should last them a day
Define watcher block
Answer:
Happens when you are watching a series / film / drama / etc. but can not retain the attention span to watch for long periods of time. As well as the shortened viewing time, the ability to retain what has been viewed is impaired.
Explanation:
The Block Watcher puts the power of a microprocessor to work analyzing the current feed to the rails. This detector has been designed to eliminate many of the installation problems associated with the installation of signal systems. ... Then connect the detector output switch to your signal system.
What is the first thing animators need to determine when beginning a project?
a Editing locations
b Length of the film or project
c Setting
d Characters
Answer:c
Explanation:
A common error by beginning programmers is to forget that array subscripts start with ________.
a. 0
b. the number of elements in the array
c. spaces
d. 1
Answer:.
Explanation:
Imagine you're in charge of managing an annual fest at your school. You have to select students and assign them different tasks. Write a short essay on the qualities and traits you would be looking for while selecting students. Explain why you think these qualities and traits are important. Also, describe how the lack of such qualities and traits would affect the work.
Answer:
Quality traits are important in many ways. A persons traits identifies them of how they treat you or how you might treat them. It is important to find good working people for the job. For example if one student is good at a specific task I might put them in that task or if another is good at stocking shelves or finding books I might put them in the library to help students find books. It is important as a supervisor to find people that listen and follow instructions not people that mess around and are unorganized. These qualities and traits are important to see the real potential of the employees. Finding the right people for the job will help the school and you as the supervisor to manage these employees. Making a application or employment sheet will help to find the right people making a sheet with some questions and have the potential employees fill it out to find their traits and skills.
Explanation:
Sorry I didn't have much background information on what you wanted me to write hope this works you can edit and change stuff though.
Also run this through Grammarly's plagiarism tester to see if it is plagiarism!
what is wrong with this picture?????
“you got a tight little-“
uhm y’know everything is wrong with it terrifying really is uhm but yeah.
oh god that leg tho
What tool can you use to discover vulnerabilities or dangerous misconfigurations on your systems and network
Answer: vulnerability scanners
Explanation:
The tool tool that can be used to discover vulnerabilities or dangerous misconfigurations on ones systems and network is referred to as the vulnerability scanner.
Vulnerability scanners are simply referred to as automated tools that is used by companies to know whether their systems or networks have weaknesses that could be taken advantage of by cyber thieves or other people and can expose such companies to attack.
Which part of project management considers if employees will work at home or in the office?
Analysis
Resources
Scope
Time
Answer:
i think its time
Explanation: you have to manage your time for the project and you wouldnt think of all the other things.
Answer: It might be resources because not everyone at home will have the same books, etc that is used in a project while making it.
Explanation:
Which of the following identifies the most appropriate courses to take in high school for someone interested in becoming a mechanical engineer?
drafting- and math-related courses
math- and science-related courses
computer- and design-related courses
science- and computer-related courses
Answer: New questions in Health
Which member of the multidisciplinary team would help a patient improve his flexibility in the joints after a knee-replacement surgery? A. a physiot…
What are two advantages of a multidisciplinary team approach? better diagnosis in complex cases shared responsibility for decisions more opportunit…
MARKING PEOPLE AS BRAINLIST PLEASEEE HELP Where is the carbon dioxide picked up and the oxygen unloaded in the body? A:Arteries B:Veins C:Capillar…
Which healthcare professional would be primarily responsible for treating a patient for his anxiety disorder after a surgery? A. a nurse B. a nutr…
Do Now: What might be a situation where it might be important to identify 3 points somebody? What are different strategies that scientists could use …
Explanation:
Anyone know the logic notation of this following logic circuit?
Answer:
Concept: Logic Circuit
You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlistWrite a program that inputs a text file. The program should print the unique words in the file in alphabetical order. Uppercase words should take precedence over lowercase words. For example, 'Z' comes before 'a'. I am stuck on this python assignment. Don't need the answer asap, just some explaining of how to write code to do that. I know about the built in sort function
Answer:
Read the file and save it to a variable as a string, split the string variable and cast it to a set object using the set function to get the unique words in the file. Then use the max function with the key attribute to use regular expression module "re" to compare the first letter of each item to return in a list comprehension or append to a list.
Explanation:
The open function is used to import a file in python, the split string method splits the string to a list of items and the set function removes any duplicates of a word or item.
Using the for loop statement, iterate over the items and compare and return the items in alphabetical order with the 're' search method getting the item with uppercase letters with higher precedence than lowercase.
What routing protocol is the most popular distance-vector routing algorithm used to determine the best routes within a network
Answer:
RIP
Explanation:
RIP is a routing protocol that stands for Routing Information Protocol. It is a distance-vector routing algorithm which uses a hop count for routing its metric. RIP is the most popular and frequently used on internet. RIP uses hop count, which means it goes from low hop count to high hop count.
Therefore, it is the Routing Infomation Protocol which is the most popular distance-vector routing algorithm used to determine the best routes within a network.