What does

mean in computer science

Answers

Answer 1

Answer:

i think the answer is a character or characters that determine the action that is to be performed or considered.

Explanation:

hope this helps


Related Questions

given that play_list has been defined to be a list, write an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list. do not modify play_list.

Answers

Answer:

new_list = play_list[0:4]

Explanation:

new_list = play_list[0:4] is an expression that evaluates to a new list containing the elements at index 0 through index 4 in play_list.

What do you mean by an expression?

A syntactic item in a programming language that may be evaluated to discover its value is known as an expression in computer science. Statement, a grammatical construct that has no meaning, is frequently contrasted with expression.

It is a grouping of one or more constants, variables, functions, and operators that the programming language interprets and calculates (in accordance with its own principles of precedence and association). For mathematical expressions, this procedure is known as evaluation.

In straightforward contexts, the outcome is typically one of several primitive kinds, such as a complex data type, a complex data string, a complex data Boolean type, or another type.

A function, and hence an expression that contains a function, may have side effects in many programming languages. Normally, a side effect-containing phrase lacks referential transparency. Expressions can be converted into expression statements in various languages by adding a semicolon (;) at the end.

Learn more about expression, here

https://brainly.com/question/16804733

#SPJ5

how many 2/8 pound patties can she make from 7/8 of a pound of hamburger

Answers

Answer:

3/8

Explanation:

Because 2 can't go into 7, the next best thing is 6, so 2x3 is 6 with 1/8 left over~~~~~hope this helps :) pls brainlist

Y’all got your tickets for Spider-Man No Way Home? I do

Answers

Answer:

IS IT THE NEW MARVEL MVOIE

Explanation:

algorithm to find the difference between two numbers second number is greater than first
Plzzz solve this problem ​

Answers

Answer:

You should concentrate yourself

Explanation:

1=x

2=y

x<y

hence proved solved thank me later

- What is the use of border? Differentiate between changing color of cells and color of data class 6​

Answers

Conditional formatting makes it easy to highlight interesting cells or ranges of cells, emphasize unusual values, and visualize data by using data bars, color scales, and icon sets that correspond to specific variations in the data.

A conditional format changes the appearance of cells on the basis of conditions that you specify. If the conditions are true, the cell range is formatted; if the conditions are false, the cell range is not formatted. There are many built-in conditions, and you can also create your own (including by using a formula that evaluates.

You have created a slide that is functional, but a bit on the boring side. In five to ten sentences, describe changes you would make to the slide to make it more effective.

Answers

To make my slide more effective, I would add two or three pale colors that would decorate it while not distracting viewers from the topic. I would also add visuals that would engage viewers and give them a better understanding of the material. Additionally, I would include more examples and details to give viewers a clearer picture of what I would be attempting to convey to them. The final thing I would do to the slide would be to organize it in a way that would present information well. In conclusion, in order to improve the effectiveness of a slide, I would make changes to its design and layout that would make it easier for viewers of the slide to understand.

Answer:

I would add colors to the backround of the slide to decorate it and make sure it is not distracting, Use different fonts but dont make it too fancy.

Explanation:

Your Welcome

Axel is conducting some online research, and he wants to narrow down his search to a specific date
range, and he only wants to find images. What should he use?
O quotations
O a Boolean search
O truncation of terms
O filters

Answers

Answer:

filters

Explanation:

you use filters to specify what you want to find

what is the full form of BASIC​

Answers

Answer:

BASIC, in fullBeginner's All-purpose Symbolic Instruction Code, computer programming language developed by John G.

I
What is a Watermark?

Answers

it is a way to show your brand or logo on a video is photo
A watermark is a little way of showing your logo of something

A state in which two things are able to exist or occur together without problems or conflict...
Question 18 options:

Compatibility

Prototype

Packet

Static

Answers

Answer:

Compatibility

Explanation:

that's the definition of compatibility.

Which of the following rules need to be followed when using variables?
Choose all that apply.

Answers

Answer:

- All variable names must begin with a letter of the alphabet or an. underscore( _ ).

-After the first initial letter, variable names can also contain letters and numbers.

-Uppercase characters are distinct from lowercase characters.

-You cannot use a C++ keyword as a variable name.

Answer:

Variable names must begin with a letter or an underscore( _ )

After the first initial letter, variable names can also contain letters and numbers. ...

Uppercase characters are distinct from lowercase characters. ...

You cannot use a keyword as a variable name.

Explanation:

A process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer�
Question 14 options:

Malicious

Algorithm

Static

Web Browser

Answers

Answer:

Algorithm

Explanation:

in addition to good design sense, what else do web designers need to be proficient in?

Answers

Web designers need to be proficient in Front-end coding languages in addition to good design sense.

Web designers build or redesign websites. They understand what it takes to make a website functional and easy to use, but also understand what is needed to make it aesthetically appealing to the user.

Web designers need to be proficient in Front-end coding languages in addition to good design sense.

Find out more on web design at: https://brainly.com/question/8391970

PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS

Answers

Scroll Down to See Answer ↓

∧-∧ But Read the Explanation to Make Sure ∧-∧

Answer/Explanation:

These algorithms have undergone extensive security analysis and are continually tested to ensure that they provide adequate security. Cryptographic algorithms will usually use cryptographic keys and when these algorithms need to be strengthened, it can often be done by using larger keys.

Encryption uses complex algorithms to scramble data and decrypts the same data using a key provided by the message sender. Encryption ensures that information stays private and confidential, whether it's being stored or in transit. Any unauthorized access to the data will only see a chaotic array of bytes.

The strength of an algorithm, is defined both in terms of it's key size, as well as it's resistance to cryptanalytic attacks. We say an algorithm is broken if there exists an attack better than brute force. So, with AES and a 128-bit key, AES is considered "secure" if there is no attack that less than 2^128 work.

There seems to be an emerging requirement to specify cryptographic strength objectively  rather than subjectively with adjectival descriptors such as weak, good or strong. It is expected  that U.S. Government (USG) and industry will soon require specific quantitative data to define the  point at which a cryptographic technology or product will satisfy user requirements.

Knowing that these 2 Choices Don't really look Right...

Because it our job = Wrong

Because encryption algorithm are always weak = Wrong

So It leads us to these...

To Prevent all Decryption = ?

To protect online Information = ?

But Base on the Information below:

Encryption can help protect data you send, receive, and store, using a device. That can include text messages stored on your smartphone, running logs saved on your fitness watch, and banking information sent through your online account.

Encryption is the process that scrambles readable text so it can only be read by the person who has the secret code, or decryption key. It helps provide data security for sensitive information.

Vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web. It’s nearly impossible to do business of any kind without your personal data ending up in an organization’s networked computer system, which is why it’s important to know how to help keep that data private.

I would say the Answer is To Protect Online Information.

You could Read the Explanation Above If you want to Check.

[RevyBreeze]

I need help with this

Answers

Answer:

It is used for the title of a page or post

the windows logon process has unexpectedly terminated

Answers

Answer

Windows corrupted

Explanation:

Try buying a new windows or resetting your laptop/pc

or your service failed to register/start

Windows login allows user accounts to log on to the system by opening the subscriber notification database and initiating user-level operations. The system may start with reduced functionality if the system resources required for Windows logon are insufficient.

What windows logon process has unexpectedly terminated?

In order to read the list of user accounts that are set up for the machine, the Windows operating system reads the registry at logon.

The Windows logon page won't appear if the data can't be read, making it impossible for users to sign in to Windows. The level of registry damage determines whether Windows can finish the startup procedure or not.

You will need to boot the computer into the Recovery Console rather than Windows in this circumstance. Use the Startup Repair tool after entering the Recovery Console. For Windows installations that won't boot, Startup Repair automates frequent diagnostic and repair activities.

Therefore, All logon attempts, however, will be blocked if the Windows registry is seriously damaged. Windows crashes when you try to log on, and it restarts after that.

Learn more about Windows here:

https://brainly.com/question/6969788

#SPJ5

(01.02
High-level programming languages are used to write a wide variety of programs, like
operating systems, scientific modeling, and general applications.

True
False

Answers

Answer:

ture

Explanation:

hope it help u

Time management is the ability to use time effectively.
Question 23 options:
True
False

Answers

Answer:

True

Explanation:

if you are able to manage time well, then that means you have good time management skills

Discussion Topic:
Web maintenance plays a vital role in a website's development. It helps ensure
the online presence of any website by performing regular updates. Discuss the
benefits of web maintenance.

Need help can someone answer plz

Answers

Answer:

Prevents lagging

Explanation:

This prevents the website from being slow and upto shape so those who access it dont have difficulties

HELP PLZ 50 POINTS
What code would add a new array item named "home" to the array below?

var titles = ["score", "points"];

titles.put("home");
titles.push("home");
titles.set("home");
array.push("home");

Answers

Answer:

titles.push("home");

Explanation:

        It depends on if you want to change the original array or not, but since you are just adding on I think this is the correct option.

        "... 5 ways to add an item to the end of an array. Push, splice, and length will mutate the original array. Whereas concat and spread will not and will instead return a new array. Which is the best depends on your use case" (www.samanthaming.com)

[] Attached is from the same source

-> I think this is correct

Have a nice day!

     I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

How can I master networking my home/business computer(s) - Tv's - iot devices and make the whole system as secure as possible?

Answers

Answer:

you can take guide from

hope this will help you....!

PLEASE HELP!!! NO LINKS PLEASE!!!! 50 POINTS!!!!!

Select any theater production that is in the public domain and that has also been made into a film, such as Romeo and Juliet. Search for the film script and the play script online. Write a few paragraphs comparing the film and live production, and write about the genre of the production. Then, compare the scripts of the theater production and the film, and write about the differences and similarities that you find. You can find film scripts and drama scripts at websites such as Simply Scripts:

Answers

Answer:

ang hirap naman plss answee

in reference to operating systems, what is spooling? what does it stand for? chegg

Answers

Answer:

Spooling is a process in which data is temporarily held to be used and executed by a device, program or the system. Data is sent to and stored in memory or other volatile storage until the program or computer requests it for execution. "Spool" is technically an acronym for simultaneous peripheral operations online.

what hash format are modern windows login passwords stored in?

Answers

User passwords are hashed and stored in a registry hive as either an LM hash or an NTLM hash. This file requires System privileges to view.

What are the windows?

Microsoft created Windows as an operating system. The operating system is responsible for allowing to use a computer. Windows comes preloaded on the majority of new personal computers (PCs), which contributes to its status as the world's most popular operating system.

A window is a distinct viewing area on a computer display screen that is part of a system that allows multiple viewing areas as part of a graphical user interface (GUI). As part of a windowing system, windows are managed by a windows' manager.

Therefore, user passwords are hashed and stored as either an LM hash or an NTLM hash in a registry hive.  

Learn more about the windows, refer to:

https://brainly.com/question/13502522

#SPJ5

Which UPPER function is written so that all text in cell B4 will be capitalized? O=UPPER(B4) O=UPPER[B4] O UPPER B4 O=UPPER

Answers

The Excel UPPER function converts a text string to all uppercase letters. Numbers, punctuation, and spaces are not affected.

So , Which upper function is written so that all text in cell b4 will be capitalized

Answer is : PROPER function

which part lets you point to objects on your screen, click on them, and even move them?

Answers

Mouse lets you point to objects on your screen, click on them, and even move them.

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs.

A computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical user interface) for pointing, moving and selecting text, icons, files, and folders on your computer.

Find out more on mouse at: https://brainly.com/question/22247989

what is Q-Basic statement​

Answers

A statement (for the QBASIC) is a set of instructions written by using keywords or commands of QBASIC. Every programming language uses keywords as a statement with certain syntax. The statements are the first stored in the memory and executed only when the RUN command is given

Match each type of option on the left with a corresponding function on the right.

Answers

Answer:

yes. the above is correct

Explanation: q posted

Answer: Anwer is correctly shown!!!!!!!!

Explanation:

HOPE IT HELPS Y'ALL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

differentiate between program virus and boot sector virus

Answers

Answer:

The virus replaces the default program with its own corrupted version. A boot sector virus is able to infect a computer only if the virus is used to boot up the computer. The computer will not be infected if the virus is introduced after the boot-up process or when the computer is running the OS

Explanation:

please mark me brainlisted answer please

Explanation:

i don't know this but i just need the points

Complete a flowchart and a Python program to calculate grade of a student based on marks using the following criteria:

Ask a student for their marks and if their marks are:

More than 90 – print “A*”

Between 80 and 90 – print “A”

Between 70 and 80 – print “B”

Between 60 and 70 – print “C”

Between 50 and 60 – print “D”

Between 40 and 50 – print “E”

Under 40 – print “Fail”

Answers

Answer:

grade = int(input("Enter grade: ")

if grade > 90:

   print("A*")

elif grade > 80 and grade < 90:

   print("A")

elif grade > 70 and grade < 80:

   print("B")

elif grade > 60 and grade < 70:

   print("C")

elif grade > 40 and grade < 50:

   print("E")

else:

   print("Fail")

Explanation:

Other Questions
A line with a slope of 10 passes through the point (0,4). What is its equation inslope-intercept form?Write your answer using integers, proper fractions, and improper fractions in simplest form. It is March 15, in the year 2514. The people of former New York are in desperate circumstances. They are being overrun, and they are losing hope. The banners proclaiming a Free the Real NYC lie in the gutters, trampled by terrified and panicked citizens. Two teens or kidz, as they are called now are on their way home from a secret meeting. As they walk in the shadows to avoid detection, they both trip on a huge titanium cylinder. Etched into the surface are a series of scratched-out words. The only words they can make out are, "he will prevail." They drag the heavy cylinder into a hidden alleyway and twist it open. The glow from their flashlights reveals the contents of the cylinder. With gasps of relief, they look at each other with hope in their eyes for the first time in years.Adam and Bridget were walking home one night from a Free the Real NYC meeting. They were walking in the shadows to avoid being caught by the curfew police when they tripped over a huge titanium cylinder. There were three words etched on it that they could read. "He will prevail?", Bridget asked quizzed, "What's that supposed to mean?" Out of curiosity, Adam opened the container. They shone their flashlights at the titanium cylinder as they gasped in awe and relief. It was a news article from December 13, 2505! It was written about how the leader of the formerly NYC was planning to build a machine that could wipe out the entire city! They rushed back to the secret base of the Free the Real NYC resistance. They put the container on the table. Now that it was in better lighting, they could read the rest of the etchings. They read , Greek for "I'm dying." They learn that the etching was written by the founder of the resistance, Henry Gihigal. He wrote it when the leader of the Cultists, Tabea Thomas, was torturing him with methods unheard of. He wrote the "He will prevail" section speaking of the resistance. The "" was to tell the resistance to choose a new leader. They started planning their attack to make sure that the machine was destroyed.Using the ideas you previously wrote in your Narrative Organization Chart and your introduction (exposition), you will write the middle (rising action and climax) of your narrative story.Important note: You will submit your introduction and middle for this assignment.View the grading rubric as you complete your work. This is your guide to a super submission.Review the ideas you wrote in your Narrative Organization Chart and your introduction.Include your introduction paragraph with your middle paragraphs.Using ideas from your chart, write the middle of your narrative: the rising action and climax.Make sure you include:two sensory descriptionsdialoguetwo eventsthe climax eventWrite 300 words or more in the middle of your story and write in the third person point of view.Save your work to your computer or drive.Submit your work in 03.07 The Middle of Your Story.Some very kind human did the middle one for me thank you so now all i need is the ending 75 words or more will give brainliest(I already did the first part i just need someone to do the end for me also read the paragraph to get a full understanding and reading the questions as you do your paragraph the final paragraph must have 75 words or more for the ending and thats all i need this is due today so please hurry thank you.) Jake has two dogs, Euclid and Pythagoras. Euclid is a smaller dog and Pythagoras is larger. Jake found that Pythagoras lost 13 pounds from January to June. If Pythagoras gains 1.2 times Euclid's weight, Pythagoras's weight would still be 1/4 pound less than he did in January. What is Euclid's weight? (a) Write an equation that represents the scenario. Begin by defining your variable (b) Solve the equation. Show your work. (c) What is Euclid's weight? (d) Jake adopts a third dog, Riemann. Riemann weighs exactly twice what Euclid weighs. The combined 1 pounds. What is Riemann's weight, and what is Pythagoras's weight? weight of the three dogs is Show your work. Can someone please help me with this one this is confusing to me :) tysm! 13-n + 2n > 8 + 1 Solve the given inequality and graph and solution The primary driver of offshore outsourcing is driven by __________. Express 30^2/3 in simplest radical form. Write inequalities for the following: A) AJ makes at least 20 dollars B) Lyla has no more than 70 barrettesC) Rook takes at most 6 presentsD) River gives no less than 8 bones of the following statements, which one best represents the role of the judicial branch of government?The judicial branch tries government employees that are accused go committing a crime.The judicial branch has the ability to declare a new law unconstitutional.The judicial branch writes the bills that are then sent to the legislative branchThe judicial branch has a responsibility to ensure that the committee system functions properly Find the values of the variables.isosceles trapezoidSide measures are: 4, 2x, 2x + 2 and 4x +3X= half the product of two number a and b, added to thrice a third number c Express 29 and 37 as the sum of two squares.If you can answer the correct answer first, then I will mark brainliest. -3y-7x When x=6, y=3 69. Plants transform energy from the sunintoA nuclear energyB chemical energy.C visible light.D steam. Compare: The graphs below show the number of points you earn in each level of a game. Which games, if any, have a proportional relationship between the number of points you earn and the level of 7the game? In which game can you earn the most points in level 2? Explain your answer. Some major life events of older adulthood include all of the following EXCEPT:A.retirementB.health problemsC.changes in relationshipsD.midlife crisis What is the average beak depth of the current finch population? The objects of the Klan, as have been already hinted at, were to banish the so-called carpet baggers from the State, restore the freedmen to positions of [laborers] under their former masters, and regain control of the government of the State.Recollections of the Inhabitants, Localities, Superstitions, and KuKlux Outrages of the Carolinas,John Patterson Green, 1880According to the text, what were the goals of the Ku Klux Klan? Check all that apply.to put the Republicans in powerto re-create the system of slaveryto rid the state of Northern officials to bring an end to the black codesto gain control of the state government if a big person and a small person run up the stairs at the same time who has more force what does the holidays mean to you paragraph