Which statement best describes a computer program?
A. A program can only perform one simple task.
B. A program is a sequence of instructions and decisions that the computer carries out.
C. A program can decide what task it is to perform.
D. A program is a sequence of comments.

Answers

Answer 1

Answer:

B is the best answer.

Explanation:

All other options listed are related to a program but B beast answers the question.


Related Questions

Despite how well you might take care of your computer, problems can always arise. When troubleshooting problems you encounter, at what point should you engage a professional for assistance

Answers

You should engage a professional for assistance when you encounter internal hardware issues during troubleshooting.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

Generally, an end user should always engage a professional for assistance when internal hardware components of a computer are faulty.

Read more on computer here: brainly.com/question/959479

3. credence is a student in college.
a. what hardware tool would you suggest for his computing system? include an explanation and the cost.

b. what software program would you suggest? include an explanation and the cost.


c. what operating system might you suggest (mac, windows, ios, android, etc) and why?

Answers

Answer: Hardware info this is a free software to read your CPU RAM GPU temp and usage

i would suggets get win rar as a zip un packer and its free

Windows 10, easy to work with and its free

Explanation:

There are they mainly are the suggested the computer system are the RAM, CPU, are the add-on the cost. Adobe, was the mainly in the used are the no cost was the included. Windows 10, was the repeatedly in the used are the easy.

What is computer?

The term computer refers to the main work of the input, processing, and the output. The computer was the based on the binary language as the data was the converted to the human language. The computer was the great invention. The computer is the mostly in the used are the main purposes.

Hardware was the main tool in the computer they are the mainly in the RAM, CPU, are the usage was the add-on the cost. The best software program was the Adobe is the best software there are the no cost was the included. The Windows 10 was the easy to use and the systematically programme.

Learn more about on computer, here:

https://brainly.com/question/21080395

#SPJ5

I need help please I just need the code to pass

Answers

Answer:

I don't know where is a code on your computer so sorry. :(

Explanation:

What is the type of data in the list [103, 405, 527, 396, 503]?

A.
Booleans
B.
strings
C.
integers
D.
alphanumeric

Answers

D. Alphanumeric.

Alphanumeric, also known as alphameric, simply refers to the type of Latin and Arabic characters representing the numbers 0 - 9, the letters A - Z (both uppercase and lowercase), and some common symbols such as @ # * and &.

Hope Helps! :)

Gabriel wants brain food for dinner the night before his final exam. What is best for him to eat? fried chicken and onion rings burgers and ice cream pizza and cookies grilled chicken and vegetables.

Answers

This is a good inquiry, especially applicable to the study of computers and technology.
It sounds like a prediction problem, in terms of measuring multiple variables calculating their betas and outputting the probability of choosing the following given we have a final the next day.

So let’s start by declaring variables for our model:

Calories: quantitative variable
Consumption time: time to eat the given food also quantitative
Cooking time: quantitative
Baking necessary: categorical 0 = no 1 = yes
Frying necessary: categorical 0 = no 1 = yes
Satisfaction brought: quantitative
Healthy: categorical 0 = no 1 = yes

Now create a data table for implementing our multinominal logistical regression function
I’ll be using 1 serving size for each measure
Fried chicken and onion rings
Cal: 320 (half chicken) + 240 (9 rings) = 560
Consumption time: 10 minutes (avg of sampling data with SD of 2.1 minutes)
Cooking time: 90 minutes + 20 minutes = 110 minutes (based on compiled recipes)
Baking: 0
Frying: 1
Satisfaction(max 10): 9 (-1 for oiliness)
Healthy: 0

Burgers and ice cream
Cal: 354 + 137(1/2 cup) = 491
Consumption time: 8 (mean with sd of 3.2)
Cooking time: 23 minutes (recipe) + 30 minutes (travel time to store and from) = 53 minutes
Baking: 0
Frying: 0
Satisfaction(max 10): 10
Healthy: 0

Pizza and cookies
Cal: 570 (2 slices) + 142 (1 cookie) = 712
Consumption time: 9 minutes (avg of sampling data with SD of 1.3 minutes)
Cooking time: 50 minutes + 72 minutes = 122 minutes (based on compiled recipes)
Baking: 1
Frying: 0
Satisfaction(max 10): 8 (not lactose intolerant friendly)
Healthy: 0

Grilled chicken and vegetables (roasted)
Cal: 162 (chicken breast) + 147 (1 cup) = 309
Consumption time: 9 minutes (avg of sampling data with SD of 1.46 minutes)
Cooking time: 30 minutes + 45 minutes = 75 minutes (based on compiled recipes)
Baking:1
Frying: 0
Satisfaction(max 10): 6 (cause chicken breast is dry and vegetables are nasty)
Healthy: 1

Now to develop our prediction model.
With training and validation data I was outputted the following beta coefficients.

X-int = 2.74
B1: -2.35 with p value of 0.002
B2: -0.72 with p value of 0.038
B3: -0.6 with p value of 0.047
B4: -1.2 with p value of 0.371
B5: -0.81 with p value of 0.016
B6: 2.91 with p value of 0.000
B7: 0.2 with p value of 0.007

Now building our prediction model we combine beta values with their coefficients then take e^x of each of the given options to find the probability of choosing each.

Answer:

Grilled Chicken and Vegetables

Explanation:

these are the two healthiest options for you body and mind

What is the value of sum after the code segment is executed?

Answers

Answer:

16

Explanation:

16  is the value of the sum after the code segment is executed.

What is a code segment?

An encryption method in computation is a chunk of a file or the equal area of the virtual addresses of the program that includes active instructions. It is sometimes referred to as a text or plain text.

An executable section of a memory chip designated to a certain operation is referred to as a function code segment. The implementation of Process Conferred Verification compares.

Let's follow the plan for the segment of the code that is to be executed in this particular if and else execution.

6 < 4 will be termed False

The following will take place

num3=num2=4

So,

num2 >= num 3 will be termed False

There is no other statement available

Currently, the values are

num1=6

num2= 4

num3= 10

Sum=

= 6+2+ 10

= 16

Learn more about  code segment, here:

https://brainly.com/question/30592934

#SPJ3

How does iteration help the engineering design process?

A.
It lets engineers know how to complete their experiments.

B.
It provides proof positive that an engineer’s plan will work.

C.
It encourages engineers to revisit past steps in the process.

D.
It ensures that all ideas or discoveries are communicated clearly.

Answers

The way that iteration helps the engineering process is that; C.

It encourages engineers to revisit past steps in the process.

What is the importance of the iteration process?

The engineering design process contains a series of steps that helps engineering teams in solving problems.

When we say that design process is iterative, it means that we repeat the steps as many times as required, by making improvements along the way as we learn from previous failure and uncover new design possibilities that help us to arrive at great solutions.

Read more about iteration at; https://brainly.com/question/24793921

A file named "dogs. Txt" exists and has 60 lines of data. You open the file with the following line of code.

aFile = open("games. Txt", "W")

You write 10 lines to the file in the program. How many lines are in the file when you close your file?

Answers

The wc command can be used to determine a file's line, character, word, and byte counts. We add the -l option to wc in order to count the number of lines. This will provide the file's name and the total amount of lines.

What lines are in the file when you close your file?

This is the simplest method for counting the lines in a text file in Python. Read all lines from a file and save them in a list using the readlines() function.

The length of the list, which is simply the total number of lines in a file, may then be determined using the len() function.

To see a file's initial few lines, use the head command. The head command will only print the first 10 lines by default. The coreutils package.

Therefore, already installed on our machine, is included with the head command. Be aware that spaces, tabs, and newlines all count as additional bytes.

Learn more about file here:

https://brainly.com/question/16379582

#SPJ2

A _____ monitors the characteristics of a single host and the events occurring within that host for suspicious activity.

Answers

Answer:

A host-based intrusion prevention system is a type of IDPS that monitors characteristics of a single host and the events occurring within that host for suspicious activity (NIST SP 800-94, February 2007; p.9). Page 3 National Archives and Records Administration

Explanation:

A Flexible Manufacturing System (FMS) is able to efficiently adapt to changing
needs.
Which of the following developments in the manufacturing industry is said to have
directly contributed to FMS technology?

Answers

Answer:

easily adapt to changes in the type and quantity of the product being manufactured

Explanation:

What is the relationship of temperature to density?

Answers

Answer:

Density is directly proportional to pressure and indirectly proportional to temperature. As pressure increases, with temperature constant, density increases. Conversely when temperature increases, with pressure constant, density decreases.

how do i use marketing in my everyday life

Answers

1. Subscribe to more emails
2. Look at billboards
3. Stop muting those pesky commercials
4. Listen to music
5. Step away from your work

How has the Internet of Things affected business

Answers

Answer:

With better information about the consumers and the market, the productivity of any business can be increased notably. IoT devices can be connected to each other and controlled to improve efficiency, which in turn has direct effects on the productivity of the business. More can be done in less time.

Explanation:

Answer: Business equipment can be continually adjusted based on analysis of data

Explanation: Took the test.

Determine if the given software is system software or application software.

Answers

Answer:

system software: system software maintain the system resource and give the path for application software to run

application software: application software is built for specific task

Explanation:

if you think the answer in your opinion correct then mark me as brain list

Answer:

I believe this to be the answer to the question you refer.

Explanation:

System software:

-data recovery

-macOS

Application software:

-presentation

-spreadsheet

Answers are cut short for convenience so do not worry if they are not the exact same answers from your question.

Also, if these answers do not even apply to your question then you have a different question. Good luck.

How can I log Into the instagram app if this pop up appears?

Answers

Answer:

tou sex die sojdifnfidjd7dhubdud

You could try changing your password

Which command prints partial or full environment variables?.

Answers

Answer:

printenv command

The command that prints partial or full environment variables is known as "printenv" command.

How can one print all the variables of the environment?

One can definitely print all the variables of the environment with the help of using env command. This env command is generally utilized by shell scripts in order to launch the correct interpreter but you can also use the env command to list available environment variables.

The env command if applied without any arguments and options, will print all the available environment variables. Apart from this, the env command also displays the values of environment variables specified in the context of the question.

Therefore, the "printenv" command is a type of command that prints partial or full environment variables.

To learn more about Computer commands, refer to the link:

https://brainly.com/question/25808182

#SPJ2

Your question seems incomplete. The most probable complete question is as follows:

Which command prints partial or full environment variables?

printenv.printvar.printgov.

_________ attacks include eavesdropping on network traffic between browser and server and gaining access to information on a Web site that is supposed to be restricted

Answers

Answer:

Passive attacks

Explanation:

A passive attack can listen to network traffic but does not interact with the packets.

Hope this helps :)

Imagine that a school decided to use a database to track television shows that students are watching. What would be some of the advantages and disadvantages of tracking students in this way? what is something to type? please hurry

Answers

Answer:

It would cause a discussion upon privacy and the validity of the information

There is also the variable of watching multiple tv shows consecutively on one day. Hope this helped

Explanation:

What is meaning of lunch bar

Answers

A lunch bar is a restaurant where the public may purchase cold meals in containers, cold wrapped sandwiches, drinks, or items retrieved through coin operated compartments for consumption on or off the premises.

difference between manual formatting and formatting in word processor​

Answers

Editing refers to making quick modification to a document using editing tools such as find and replace spelling and grammar checkers, copy and paste or undo redo features.

Formatting refers to changing the appearance of text in a document such as text formatting or page formatting or paragraph formatting.

Special web browsers, called _______ browsers, are designed to run on portable devices such as smartphones and tablets

Answers

Answer:

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets

Special web browsers, called mobile browsers, are designed to run on portable devices such as smartphones and tablets.

Mobile browsers are web browsers specifically optimized and designed to operate on portable devices such as smartphones and tablets. These browsers are tailored to meet the unique requirements and constraints of mobile devices, including smaller screens, touch-based input, and limited processing power.

Mobile browsers offer a user-friendly interface that accommodates the smaller screen size of mobile devices, allowing users to navigate websites and access web content efficiently. They often incorporate features like pinch-to-zoom, gesture-based controls, and responsive design support to enhance the browsing experience on mobile devices

To learn more on Mobile browsers click:

https://brainly.com/question/19561587

#SPJ6

What should you do when you are working on an unclassified system and receive an email.

Answers

Answer:

Don't respond to it. Either leave it there, or just delete it. It is most likely spam or a scammer trying to get your information. Don't respond, please.

What is.the web usually called?

Answers

Answer:

the internet?

Explanation:

Consider the following code, which is a portion of SomeClass. The instance variable is initialized by the constructor. The method is supposed to multiply the value passed as a parameter by the instance variable and update the value of the instance variable. However, there is a problem. Re-write this code, without renaming any variable names, to resolve the problem.

private int number;

public void multiplyNumbers(int number)

{

number = number * number;

System. Out. Println("The local variable is: " + number);

System. Out. Println("The instance variable is: " + number);

}

Answers

Use the knowledge of computational language in JAVA to write a code which is a portion of SomeClass.

How to write code that uses a file?

To make it simpler the code is described as:

SomeClass

private int number;

public void subtractNumbers(int number)

{

   number = number − number;

   System.out.println("The local variable is: " + number);

   System.out.println("The instance variable is: " + number);

}

See more about Java at  brainly.com/question/2266606

Answer:

Correct code (For everyone confused):

private int number;

public void multiplyNumbers(int number) {

 this.number = this.number * number;
 System.out.println("The local variable is: " + number);
 System.out.println("The instance variable is: " + this.number);

}

Explanation:

the this. command allows the instance variable of the class to be called instead of the variable in the constructor which as shown can stay the same while still changing the instance variable of the same name. Allowing for the code to be, say if int number was 5. Then the instance variable would be, 5 + 5, which would print:

The local variable is: 5
The instance variable is: 10

Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Answers

Coding:

def main():

 name = input("Enter your name: ")

 age = input("Enter your age: ")

 color = input("Enter you favorite color: ")

 birth = input("Enter your birthday: ")

 print(name + " is "+age+" year(s) old.")

 print(name + "'s favorite color is "+color)

 print(name + " was born on "+ birth)

main()

Explanation:

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

1.5 code practice question 4

Answers

Answer:

Do you know what the question is for this?

Explanation:

Do you know What the question is?


Explain the Paragraph tag and its attributes.

Answers

Answer:

Attribute Value Description

align left right center justify Obsolete Specifies the horizontal alignment of the text within a paragraph. Use the CSS text-align property instead.

You can tell that parseInt() is a(n) ____ method because you use it with the class name and not with an object.

Answers

Parse Int() is a(n) static method because you use it with the class name and not with an object.

Is parseInt a static method?

The term or computer language (Java - parse Int() Method) is known to be a method that is often used to get back the primitive data type of a particular String.

Conclusively, the  parse Xxx() is known to be a static method and one can use it to make or have one or more argument.

Learn more about object from

https://brainly.com/question/24445340

________, also known as mini notebooks, are lighter and thinner with longer battery life than most laptops.

Answers

Netbooks or Ultrabook  also known as mini notebooks, are lighter and thinner with longer battery life than most laptops.

What is mini notebook computer?

This is a term that is also called Netbooks.  They are regarded as  “small form” computers.

Ultrabook is known to be a small and very portable laptop that is known to be very light and thin and also has a longer battery life than other kinds of laptops.

Learn more about books from

https://brainly.com/question/17506968

what is meant by internet surveillance?....ONLY ANSWER IF YOU KNOW​

Answers

Answer:

As a brief definition, Internet surveillance refers to your computer and online activity, online and offline data, and Internet traffic being monitored and logged by government agencies, ISPs, and – potentially – cybercriminals.

Explanation:

can I have brainliest

Answer: I LIKE EM BIG AND JUCIY

Explanation:

Other Questions
PLEASE ANSWER ASAP 50 POINTS BRAINLIEST IF CORRECTThe First Battle of Bull Run was considered A: a setback for the Union.B: an easy victory for the Union.C: a difficult victory for the Union.D: a loss for both sides with no clear winner. what was life like in jerusalem under the abbasid dynasty ASAP HELP RNAshley is diving in the ocean. She wants to reach a coral reef that is 60 feet below sea level; that is, the reefs elevation is -60 feet. She decides to safely descend to the reef from the oceans surface in increments of 10 feet. Answer the following questions to learn more about Ashleys rate of descentPart BWrite a numerical expression that represents the number of increments it will take Ashley to reach -60 feet.Part CIs the number of increments in part B positive or negative?Part DRewrite the expression from part B by distributing -1 from each of the negative numbers.Part EIf you divide any number by itself, what is the result? How can you apply this result to the expression in part D?Part FBased on your work so far, how many increments of -10 feet are in -60 feet?Part GCopy and paste this image into the space below the correct number of times to show an elevation of -60 feet.Part HSuppose that Ashleys brother, Alex, makes the same dive in 4 increments instead of 6 Write a numerical expression to represent Alexs elevation change in feet per increment.Part IHow many negative numbers are in the expression in part H? What will the sign of the solution be? How do you know?Part JWhat was Alexs elevation change in feet per increment? Systems Theory views organizations as analogous to living organisms. How do the Systems concepts of stability, growth, and adaptability describe Snak Pak Attak Determine which of the following are the solutions to the equation below.x2 = 13 Which of these might cause a STOP error in Windows? Select 2 options What those suffering from an eating disorder need to do in order to heal their bodies and mind and to be on track for getting better eating disorder video responders questions please solve any four questions of these 10 questions multiply (5y+x)(5y-x) Does dilations increase the length of line segment is true or false ? The Tyrant of Syracuse*by H. A. GuerberThe city of Syracuse in Sicily . . . was ruled by a man . . . whose name was Dionysius. [He] had seized power by force, and kept his authority by exercising the greatest severity. He was always surrounded by guards, who at a mere sign from him were ready to put anyone to death.Dionysius was therefore feared and hated by the people whom he governed, but who would have been very glad to get rid of him. No honest man cared to come near such a bloodthirsty wretch, and there were soon none but wicked men to be found in his court.These men, hoping to win his favor and get rich gifts, used to flatter him constantly. They never told him the truth, but only praised him, and made believe to admire all he said and did.Of course, even though they were wicked too, they could really admire him, but secretly hated and despised him. Their praise, therefore, was as false as they and their advice was always as bad as bad could be.Now, Dionysius was as conceited as he was cruel, and fancied that there was nothing he could not do. Among other things, he thought he could write beautiful poetry. Whenever he wrote a poem, therefore, he read it aloud to all his courtiers, who went into raptures over it, although they made great fun of it behind his back.Dionysius was highly flattered by their praise, but thought he would like to have it confirmed by the philosopher Philoxenus, the most learned man of Syracuse.He therefore sent for Philoxenus, and bade him give his candid opinion of the verse. Now, Philoxenus was far too noble a man to tell a lie: and whenever he was consulted by Dionysius, he always boldly told the truth, whether it was agreeable or not.When the tyrant asked his opinion about the poems, therefore, he unhesitatingly answered that they were trash, and did not deserve the name of poetry at all.This answer so angered Dionysius, and so sorely wounded his vanity, that he called his guards, and bade them put the philosopher into a prison hewn out of the living rock, and hence known as "The Quarries."Here Philoxenus was a prisoner for many a day, although his only fault was having told the tyrant an unwelcome truth when asked to speak.The philosopher_s friends were indignant on hearing that he was in prison, and signed a petition asking Dionysius to set him free. The tyrant read the petition, and promised to grant their request on condition that the philosopher would sup with him.Dionysius' table was well decked, as usual, and at dessert he again read aloud some new verses he had composed. All the courtiers went in to ecstasies over them, but the philosopher did not say a word.Dionysius, however, fancied that his long imprisonment had broken his spirit, and that he would not now dare refuse to give a few words of praise: so he pointedly asked Philoxenus what he thought of the poem. Instead of answering, the philosopher gravely turned toward the guards, and in a firm voice cried aloud, "Take me back to The Quarries." thus showing very plainly that he preferred suffering to telling an untruth.The courtiers were aghast at his rashness, and fully expected that the tyrant would take him at his word and put him in prison, if nothing worse; but Dionysius was struck by the moral courage which made Philoxenus tell the truth at the risk of his life, and he bade him go home in peace.Write a short summary of this story. Pls answer i will mark u brainlist 2. The narrator acknowledges that at least women were counted as 5-fifths of a person whendetermining a state's population. This is a reference to what agreement from pre-Civil Warhistory? (Answer not in the video)a BRAINLIEST FOR CORRECT ANSWER!Which statement below best describes the graph shown. A) the amount of money a car salesman makes weekly B) the distance you ride your bike if you ride at a speed of 5 mph C) the height of a tennis ball thrown in the air D) the height of a sunflower that grows 0.5cm per week Which courts are the entry point for the national court system, hearing all cases involving federal criminal and civil law HELP ASAP!!!!!Based on what you learned from the Reproduction and Energy article, why do you think this happens? You can review the article again (located in your Digital Resources) to be more sure about your response. Referring to captured slaves as "contraband" reflected the fact that Please help I will mark brainlyest 100 points The circle graph shows the results of a survey by a bakery on which of their new products 69 customers preferred most. How many customers preferred bread? Round your answer to the nearest whole number. Which note best summarizes the central idea of "a simple way to create suspense"? lee child wrote books