Answer:
I'd choose A, all of the above.
Reasoning Why:
I'll be taking you on a step to step process on why I inputted the answer.
The <div>, is basically like a container that you can group tougher, why this is great is because you can edit the div using a background-color effecting that group such as the following..
EXAMPLE OF BACKGROUND-COLOR DIV (background-color)
<!DOCTYPE html>
<html>
<head>
<title>Brainly Example | HTML Div</title>
<style>
#byexample{
background-color:red;
/*Example of the Background-color attrib*/
/*You can also use the background-image attrib, however I recommend you checkout W3Schools, on that topic.*/
}
</style>
</head>
<body>
<div id="byexample">
<p>Just some random text to demonstrate.</p>
</div>
</body>
</html>
END OF EXAMPLE
You can also, in the <div> change multiple styles of an element in the div. However, if do want to change the styles of a single element you would need to nest it.
<!DOCTYPE html>
<html>
<head>
<title>Brainly Example | HTML Div</title>
<style>
#byexample #text{
background-color:red;
color:yellow;
}
</style>
</head>
<body>
<div id="byexample">
<p id="text">Just some random text to demonstrate.</p>
</div>
</body>
END OF EXAMPLE
Lastly, you can group elements using divs, as stated in openclassroom (website).
Anyways, I hope this helped!
Happy coding!
What kinds of circumstances would lead you to writing a function versus using a loop? please explain in simple terms
Answer:
1. You want to use parameters
2. You don't want your program to run multiple times
3. You want to call that snippet of code throughout your program
hope this helped :D
Write a program to have the computer guess at a number between 1 and 20. This program has you, the user choose a number between 1 and 20. Then I, the computer will try to my best to guess the number. Is it a 18? (y/n) n Higher or Lower (h/l) l Is it a 5?(y/n) n Higher or Lower (h/l) h Is it a 10? (y/n) y I got tour number of 10 in 3 guesses.
Answer:
This question is answered using C++ programming language.
#include<iostream>
#include <cstdlib>
#include <ctime>
using namespace std;
int main(){
int num, computerguess;
char response, hl;
cout<<"Choose your number: ";
cin>>num;
srand((unsigned) time(0));
int high = 20; int low = 1; int guess = 0;
computerguess = low + rand() % high;
cout<<"Is it "<<computerguess<<" ?y/n: ";
cin>>response;
while(response == 'n'){
cout<<"Higher or Lower? h/l: ";
cin>>hl;
if(hl == 'h'){ low = computerguess+1; }
else{ high = computerguess-1; }
guess++;
computerguess = low + rand() % high;
cout<<"Is it "<<computerguess<<" ?y/n: ";
cin>>response;
}
cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";
return 0;
}
Explanation:
This declares num (user input) and computerguess as integer
int num, computerguess;
This declares response (which could be yes (y) or no (n) and hl (which represents high or low) as char
char response, hl;
This prompts user for input
cout<<"Choose your number: ";
This gets user input
cin>>num;
This allows the computer be able to generate different random numbers at different intervals
srand((unsigned) time(0));
This declares and initializes the range (high and low) to 20 and 1 respectively. Also, the initial number of guess is declared and initialized to 0
int high = 20; int low = 1; int guess = 0;
Here, the computer take a guess
computerguess = low + rand() % high;
This asks if the computer guess is right
cout<<"Is it "<<computerguess<<" ?y/n: ";
This gets user response (y or n)
cin>>response;
The following iteration is repeated until the computer guess is right
while(response == 'n'){
This asks if computer guess is high or low
cout<<"Higher or Lower? h/l: ";
This gets user response (h or l)
cin>>hl;
If the response is higher, this line gets the lower interval of the range
if(hl == 'h'){ low = computerguess+1; }
If the response is lower, this line gets the upper interval of the range
else{ high = computerguess-1; }
This increments the number of guess by 1
guess++;
Here, the computer take a guess
computerguess = low + rand() % high;
This asks if the computer guess is right
cout<<"Is it "<<computerguess<<" ?y/n: ";
This gets user response (y or n)
cin>>response; }
This prints the statistics of the guess
cout<<"I got your number of "<<num<<" in "<<guess+1<<" guesses.";
You’ve been tossed into an insane asylum. What do you tell the people there to prove to them that you don’t belong inside?
An asylum is for crazy people. I'm crazy. Crazy people don't realize they're crazy. If I realize I'm crazy, then I'm not crazy. Therefore, I do not belong here.
Which of the following best describes the protocol used on the internet?
Answer:
The protocols of the Internet are open and used by all devices connected to the network
Explanation:
There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly. There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.
Which visual novels do you recommend and why?
Answer:
I rec recommend Fate/Stay Night. It's honestly so good!
Explanation:
is it just me or do people delete other peoples questions and it shows up in my inbox staying its mine
Answer:
yessss same bru.h
Explanation:
Answer:
ive had that happen before i dont know why it happens
What is the other name of the horizontal column graph?
graph is also known as the horlzontal column graph.
Answer:
Side Graph mabye?
Explanation:
Answer:
A bar graph.
Explanation:
A bar graph is also known as the horizontal column graph.
Which of the following is NOT true regarding fonts which should be used in memos?
O Typically serif fonts are used such as Times New Roman
O Typically sans-serif fonts are used such as Arial
O Headers should be 12-point font size
O Body text should be 10-point font size
Answer: Typically serif fonts are used such as Times New Roman.
Explanation: Have a gr8t day and pls mark me brainliest.
Eli needs to export files from his mailbox into a single file that is portable and can be backed up to removable media. Which file type will he use?
Answer:
PST
Resource:
This question has already been answered here: https://brainly.com/question/18415952
Explanation:
PST is the personal storage table, which is a file built by Microsoft to store data from outlook and other services too. Really quick, this may or may not be an option that you are looking for but, what I would do in my opinion would be to use the PST and export it on a removable USB, since USBs are removeable media.
What security concept states a user should only be given the minimum set of permissions required to perform necessary tasks
What will you see on the next line?
>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)
1
7
3
2
Answer:
its 3, just did it on edg 2020
Explanation:
sdfdsfdsfdsfsdfsdf vote me brainliest!
The next line after >>> aList = [12, 3, 5, 7, 7], >>> aList.index(7) is 3. The correct option is c.
What is an array?A group of identical objects or pieces of data held near to one another in memory is referred to as an array. An array type is a user-defined data type that consists of an ordered collection of objects of a single data type. Ordinary array types have a set maximum number of elements they can hold and use the ordinal position as the array index.
The unordered list that is a part of the simple array is thus visible. The unordered list can be converted to an ordered list by executing the command "aList. sort()".
So, the next line will be:
>>> aList = [12, 3, 5, 7, 7]
>>> aList.index(7)
3
Therefore, the correct option is c. 3.
To learn more about array, refer to the link below:
brainly.com/question/14915529
#SPJ2
help plz (will give brainliest)
Answer:
The answer to this question is given below in the explanation section.
Explanation:
This is the python program in the question that is:
def sum(n1,n2):
n=n1+n2
return n
The question is: write a function CALL that displays the return value on the screen.
So, the correct program is written below:
*********************************************************************
def sum(n1,n2):# it is function that define sum
n=n1+n2 # variable n that store the result of n1 and n2
return n # return the result
print(sum(3,5))# call the sum function with parameter 3 and 5 , it will print 8
print(sum(4,101))
# call the sum function with parameter 4 and 101 it will print 105
********************************************************************************
you can also store the sum result into another variable, because this function return the sum. So, you can store that return value into another vairable and using the print function, to print the value of this variable such as:
*****************************************************************************
def sum(n1,n2):# it is function that define sum
n=n1+n2 # variable n that store the result of n1 and n2
return n # return the result
result= sum(6,9) # store the sum result into another variable i.e result
print(result)# print the result variable value
*****************************************************************************
What is the function of a web browser, and what are the main components of a web address?
Answer:
The primary function of a web browser is to render HTML, the code used to design or "mark up" webpages. Each time a browser loads a web page, it processes the HTML, which may include text, links, and references to images and other items, such as cascading style sheets and JavaScript functions.
1. Protocol
2. Domain
3. Subdomain
4. Path
5. Query parameters
6. Fragment identifier
The Function of a Web Browser:
1. Requesting Web Pages: The web browser sends requests to web servers to fetch specific web pages or resources (such as images, videos, and stylesheets) associated with those pages.
2. Rendering Web Pages: Once the web browser receives the requested content from the server, it interprets and renders the HTML, CSS, and JavaScript code to display the web page's content and structure.
3. Supporting Multimedia: Web browsers are capable of handling various multimedia elements, such as images, audio, and video, allowing users to experience a rich and interactive web environment.
4. Managing History and Bookmarks: Web browsers keep track of the browsing history, allowing users to revisit previously visited sites. They also provide features to bookmark and save favorite websites for quick access.
Main Components of a Web Address (URL):
A web address, also known as a URL (Uniform Resource Locator), is the unique address used to identify a specific web page or resource on the internet. It consists of several components:
1. Protocol: The protocol is the method used to access the resource.
2. Domain: The domain is the address of the website or server hosting the resource. It is typically the main part of the URL.
3. Subdomain (Optional): Subdomains are prefixes added before the main domain.
4. Path: The path specifies the location of the specific resource on the server. It may include directories and filenames.
5. Query Parameters (Optional): Query parameters are additional data passed to the web server for processing.
6. Fragment Identifier (Optional): The fragment identifier is used to specify a specific section or anchor within a web page.
Learn more about Web here:
https://brainly.com/question/27961981
#SPJ6
Why would it be useful to split up the coding for creating an app between multiple programmers? Select 2 options.
greater innovation
greater control over the code.
faster development.
greater consistency between sections of code.
Answer: c
Explanation:
Answer:
I'd be willing to wager it is A and D but not 100% sure.
Explanation:
help pleaseee!!!!!!! will give brainliest !!!!!
How do you increase the number of CPUs in a virtual machine in order to optimize it?
Answer:
Not sure if this will help
Explanation:
increase the number of motherboards, and install compatible CPUs on each motherboard
) Find and write the o/p :
X=[“F”,66,”QE”,15,”S”,34]
Y=0
Z=” ”
A=0
for c in range(1,6,2)
Y+=c
Z=Z+X[c-1]+'$’
A+=X[c]
Print(x,y,z)
Answer:
The output of this question is
['F', 66, 'QE', 15, 'S', 34] 9 F$QE$S$
Explanation:
In this question the user want to print the value of X,Y and Z
Let calculate the value of X first.
As the value of X is not altered in the program to its value will be the same that is:
['F', 66, 'QE', 15, 'S', 34]
Now we will calculate the value of Y
It is written as
Y+=c
which can be written as Y=Y+c
The loop here start form 1, the it go to 3 then 5 as explained below
Range(1,6,2) is written
The first value is the start value
The second value is stop value
While the third value is how much to increment.
So first its value will be 1 then increment it by 2. It will become 3
then increment it by 2 again it will become 5. in the next step it will become 7 which is out of range
so
Y=Y+c => Y=0+1 (first loop)
Y=1+3 (second loop)
Y=4+5 (third loop)
Some y will be 9
Now let focus on the value of Z
Z= " " +X[1-1]+'$' (first loop) value of c=1
so it will become
Z=F$
Now in 2nd Loop
Z=" " + X[3-1]+'S' (2nd loop) value of c=3
it will become
Z=QE $
Now in 3rd Loop
Z=" " + X[5-1]+'S'
it will become
Z=" " S + $
so the overall answer of print will become
['F', 66, 'QE', 15, 'S', 34] 9 F$QE$S$
What is the purpose of slicing?
a. To combine characters in order to form a single string
b. To combine two or more strings into one big string
c. To pull out a group of characters from a string
d. To pull out one specific character from a string
Answer:
C
Explanation:
Because a and b are talking about combining and when you slice you don't combine when you slice and when you slice something its into 2 or more parts, unlike what d says
List five types of system information that can be obtained from the Windows Task Manager. How can you use this information to confirm the presence of malware on a system
Answer:
Part A;
Five types of system information that can be obtained from the Windows Task Manager includes;
1) The processes taking place
2) The performance of the system components, including the, CPU, Memory, Disk, Wi-Fi, GPU, and a live summary of the metrics of the computer
3) The App history
4) The list of startup
5) The current users of the computer
Part B;
By going through list of active processes on the Windows Task Manager, a malware can be detected as a rogue or unidentified process that may be running on the background. The name of a process may seem legit, but however, the process is not supposed to be running, such as a program which is not running or installed on the system but the process is seen running on the Windows Task Manager, that is a sign of a malware on the system
Explanation:
Categorize each memory card as based on new or old technology. PLEASE HELP.
Answer:
SD Cards and XDQ Cards are new XD Cards and CF Cards are old.
Explanation:
Hope this helps.
Select the correct answer
Which filter enhances the color contrast around the edges of an image?
A. Texture filters
B.Sharpen filters
C.Blur filters
D.Noise filters
Answer: C. Blur filters
Explanation:
The unsharp mask filters or blur filters can be used for professional color correction. This will adjust the contrast of the image. Edge details and may produce a darker and lighter line on all side of the edges. This helps in creating illusion or blur image giving a sharp contrast and sharper image.
So, the color answer C. Blur filters
Answer:
B, Sharpen Filters
Explanation:
i got it right lol
answer this now
and thanks
Answer:
the process of burning something
Answer:
Option D) the process of burning something
Explanation:
Combustion, or burning, is a high-temperature exothermic redox chemical reaction between a fuel and an oxidant, usually atmospheric oxygen, that produces oxidized, often gaseous products, in a mixture termed as smoke.
The type of medium used to hide data in steganography is referred to as __________. This may be a photo, video, sound file, or Voice over IP, for example.
Answer:
:L
Explanation:
Answer:
symmetric cryptography
Explanation:
Kris is the project manager for a large software company. Which part of project management describes the overall project in detail?
1) Analysis report
2) Resources document
3) Scope
4) Scope creep
Answer:
Scope or 3)
hope this helps
always love to be marked brainliest
What predefined match policy allows viewers to watch a claimed video but does not allow ads to display on the video
Answer:
The correct response is "Track".
Explanation:
Tracks encourage the individual that listens to that same music video to miss or ignore that same starting of almost any soundtrack at a certain moment. It might also impact an individual who accompanies a facility that implements or obeys guests.For obvious reasons, a digital ad service can track client's internet search engine behavior patterns to continue providing accurate recommendations.
select the correct option
and thanks
Answer:
Cucumber
Explanation:
Cucumber has the largest portion. .08 kg/tray/day. The entire graph equals 100%, and the cucumbers take up 17.8% of it.
Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and how would those questions affect your recommendation?
Answer:
I would ask her: One, how large will the business be? Two, how secure she wants/needs the connection to be. And three, how much money she is willing to spend to install and/or maintain her network.
Since Kayla is just starting her business, my recommendation would be to set up her network as a LAN. A LAN is a group of computers and network devices connected together, and most often reside in one building. Kayla's business will start small, so it is not needed to set up her network as a WAN. WAN's are usually not restricted to a geographical location, and can be expanded to cover a whole country, or even a planet. A LAN would make sense in the coverage aspect, since Kayla's business has not expanded yet.
Depending on how secure she wants her network to be, she can choose whether or not she uses WAN or LAN. WAN is less secure, as it covers a large geographical area, while LAN is more secure. LAN is more secure because it covers a smaller area. I would recommend using LAN as it is better to have a secure network as a business.
Finally, Kayla needs to address the cost of setting up and maintaining a LAN or WAN. I would recommend that Kayla uses a LAN because as a starting business, it is important to allocate money properly. LAN's usually cost less to install and maintain due to it's smaller geographical radius, so it would be best to choose to set up her network as a LAN.
Explanation:
How does entertainment relate to coding?
Answer:
not sure if this is the type of answer you're looking for but: Entertainment can relate to coding because in TV shows and movies, there is lots of editing. Especially with cartoons. Inorder to make these, we have to use coding. This can even relate to real life plays and preformenses depending on how much technology you use to preform them.
When do you use a for loop?
Answer:
You use a for loop when you know how many times you want to run the loop
Explanation:
if you dont know, use a while loop
8.10 Code Practice Question 1
Write code that takes in two words from user input and stores them in the variables x and y respectively. Then, the programs the values in x and y, and print x and y).
Note: The variable names x and y are required for this question
x = input("Enter a word: ")
y = input("Enter a word: ")
x,y = y, x
print(x)
print(y)
I hope this helps
Since we need to perform some coding functions such as:
Asking for the input of a numberStoring them as individual variablesPrinting/Displaying the values independently.First thing we need to do is to declare the unknown variables as x and yNext would be to write the input this way:
x= input ("Put a word:")
y= input ("Put a second word:")
x,y = y, x
Print(x0
Print(Y)
Read more about programming here:
https://brainly.com/question/18900609
Name the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.
A. Harp
B. Violin
C. Viola
D. Clarinet
The subject is Music Technology.
Answer:
VIOLIN
Explanation:
The VIOLIN is the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.