Computer programmers must be fluent in every programming language. (5 points)
O True
O False

Answers

Answer 1

Answer:

False, its true that they need to know some programming languages but they do not need to be fluent in all of them.


Related Questions

Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2
a) Tim Max, Min của dãy số
c) Sắp xếp dãy số thành dãy không tăng
d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k

b) Sắp xếp dãy số thành dãy không giảm

Answers

Answer:

Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2

a) Tim Max, Min của dãy số

c) Sắp xếp dãy số thành dãy không tăng

d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k

b) Sắp xếp dãy số thành dãy không giảm

Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2

a) Tim Max, Min của dãy số

c) Sắp xếp dãy số thành dãy không tăng

d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k

b) Sắp xếp dãy số thành dãy không giảmBàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2

a) Tim Max, Min của dãy số

c) Sắp xếp dãy số thành dãy không tăng

d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k

b) Sắp xếp dãy số thành dãy không giảm

Explanation:

Bàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2

a) Tim Max, Min của dãy số

c) Sắp xếp dãy số thành dãy không tăng

d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k

b) Sắp xếp dãy số thành dãy không giảmBàil: Cho số nguyên N=10, Dãy A gồm các số: 26 30 6 37 4|15 21 526 2

a) Tim Max, Min của dãy số

c) Sắp xếp dãy số thành dãy không tăng

d)ChoK=21 vảk=10. Tm chỉ số i sao cho ai=k

b) Sắp xếp dãy số thành dãy không giảm

What is a computer? ​

Answers

Answer:

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs. These programs enable computers to perform a wide range of tasks. A computer system is a "complete" computer that includes the hardware, operating system, and peripheral equipment needed and used for "full" operation. This term may also refer to a group of computers that are linked and function together, such as a computer network or computer cluster.

Explanation:

pasagot po pls
tle-6​

Answers

Of art check TV ex ex hvubib if tff do

what is the answer ??​

Answers

Answer:

option 1 is correct go with 1s .

You can open an HTML document only in ________.
A. Internet Explorer
B. M.S Excel
C. Note Pad
D. None of these
please solve it fast its urgent ​

Answers

Answer:

You can open a HTML document in internet explorer usually browsers can open HTML files.

based on mla guidelines, what is the correct line spacing?

Answers

Answer:

Double spaced lines are correct.

Explanation:

And for works cited use double indent

Order the steps to creating a new rule to handle meeting request responses in Outlook

Answers

Answer:

posting this. your photo order is correct.

Explanation:

what are the seven phases of design plans that the main features of designer-client communication at each phase

Answers

Answer:

Step 1 – Study the Client Brief. ...

Step 2 – Research, Research, Research. ...

Step 3 – Brainstorm. ...

Step 4 – Sketch. ...

Step 5 – Concept Development. ...

Step 6 – Revisions. ...

Step 7 – Completion.

Explanation:

which of the following has the highest priority?
1) Browser Default
2)External style sheet
3)an inline style (inside a specific HTML element)
4)An internal style sheet (in the head section)

Answers

Answer:

External style sheet

Explanation:

External style sheet

what was the name of the earliest iteration of the internet?

Answers

Answer:

ARPANET

Explanation:

ARPANET was the name of the earliest iteration of the internet.

What is ARPANET?

The first open packet-switched computer network was the U.S. Advanced Research Projects Agency Network (ARPANET). In 1989, it was ultimately deactivated after being put into use in 1969. The primary applications of ARPANET were in academia and research.

The Advanced Research Projects Agency Network, or ARPANET, was developed in the late 1960s and served as the first functional prototype of the Internet. ARPANET, which was first supported by the US Department of Defense, used packet switching to enable multi-computer communication across a single network.

The first distributed control network was the ARPANET. It introduced TCP/IP protocols initially. With the employment of these technologies, the Internet was essentially only getting started. It was created with the fundamental goal of facilitating communication among scientific users.

Thus, it is ARPANET.

For more information about ARPANET, click here:

https://brainly.com/question/28577400

#SPJ2

what version of vsftpd contained the smiley face backdoor?

Answers

Answer:

Chris Evans, author of vsftpd announced that the master site for vsftpd was compromised and that the latest version of vsftpd (vsftpd-2.3.4.tar.gz) was backdoored. The backdoor payload is interesting. In response to a smiley face in the FTP username, a TCP callback shell is attempted. There is no obfuscation.

Explanation:

The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor, according to vsftpd programmer Chris Evans. The payload on the backdoor is intriguing. A TCP callback shell is tried in response to a smiley in the FTP username. There is no concealment.

What version of vsftpd had smiley face backdoor?

Vsftpd version 2.3. 4 that could be downloaded from the main site was found to have been compromised in July 2011. A ":)" smileyface can be used as the username when entering into a compromised vsftpd-2.3. 4 server, giving users access to a command shell on port 6200.

The idea behind the attack against VSFTPD 2.3. 4 is to send a specific sequence of bytes on port 21 to start the malicious vsf sysutil extra() function, which, if executed successfully, opens the system's backdoor on port 6200.

causes the backdoor to be opened, which causes a shell to start listening on TCP port 6200. After a client connects to it and disconnects from it, the shell stops listening. This might be used by a remote, unauthenticated attacker to execute arbitrary code as root.

Thus, The master site for vsftpd was compromised, and the most recent version of vsftpd has a backdoor.

For more information about vsftpd had smiley face backdoor, click here:

https://brainly.com/question/535743

#SPJ6

explain on what you did and give on how problems as such can be avoid inthe future

Answers

More info please, it is very invalid

qbasic program to check whether an entered number is positive or negative or neutral​

Answers

Answer:

CLS

INPUT "Enter a number: ",N

IF N > 0 THEN

PRINT "The number is Positive."

ELSEIF N < 0 THEN

PRINT "The number is Negative."

ELSE

PRINT "The number is Zero."

END IF

END

write down the steps to start computer.​

Answers

Answer:

To start a Desktop PC:

Ensure the PC is plugged in.  

Press the power button.  

Let the computer start.

When prompted, insert the password if you have one set.  

To start a laptop:

Press the power button.

Let the laptop start.

When prompted, insert the password if you have one set.

Write pseudocode for one or more selection statements to decide whether a year is a Leap year. The rules are:

A year is generally a Leap Year if it is divisible by 4, except that if the year is divisible by 100, it is not a Leap year, unless it is also divisible by 400. Thus 1900 was not a Leap Year, but 2000 was a Leap year.

Answers

Year = input()

isLeapYear= false
if Year%4 = 0
if Year%100 != 0 or Year%400 == 0
isLeapYear = true
print(isLeapYear)

In this exercise we have to use the knowledge of the python language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

Year = input()

isLeapYear= false

if Year%4 = 0

if Year%100 != 0 or Year%400 == 0

isLeapYear = true

print(isLeapYear)

See more about python at brainly.com/question/26104476

lauren wants to write short articles and post them online. if she has an internet connection, what software can help her do her work?

Answers

Lauren could accomplish her aim if she has an internet connection by making use of Zoho writer.

Zoho writer provides Lauren with a platform to write and post her documents as long as she has internet connection because zoho writer is cloud based.

The fact that Zoho writer ls cloud based, it means that only internet connection is required as the platform is equipped with a word processing tools and a clean user interface, which provides all the tools required to write a good document.

Therefore, zoho writer software could be adopted by Lauren once she has internet connection.

Learn more :https://brainly.com/question/24978746

boolean logic deals with statements having one of _____ values.

Answers

Answer:

2 values

Explanation:

boolean statements can only be True or False

helppppppppppp pleaseee​

Answers

Answer:

3. Multimedia Projectors

Explanation:

Ive had this quiz before lol

Answer:

c

Explanation:

its c

1. Define the term Intranet.
2. List three advantages of the intranet.
3. List three disadvantages of the intranet.
4. Briefly define the term extranet. 2marks
5. List three advantages of the extranet.
6. List two disadvantages of the extranet.

Answers

Answer:

1.a local or restricted communications network, especially a private network created using World Wide Web software.

2.Enhanced employee engagement.

Increased productivity.

Better connection and collaboration of distributed employees.

Streamlined communication of change management.

Establishing and reinforcing a strong company culture.

Efficient time management.

3.Costly and timely implementation. Intranet can be very costly and time-consuming to implement.

Complexity and heavy admin burden.  

Poor user experience.  

Low user adoption.  

Time-consuming information search.  

Internal use only.  

Lack of employee advocacy.  

Hard to measure success and effectiveness.

4.An extranet is a private network that enterprises use to provide trusted third parties -- such as suppliers, vendors, partners, customers and other businesses -- secure, controlled access to business information or operations.

5.Information sharing is simple. Without a client extranet, you're likely sharing files with outside parties via email.  

Documents are safe and secure.  

Project management is easy.  

Setup and training require little to no IT involvement.  

Professional branding makes a great impression.

6.Cost. It is no doubt that extranet involves direct expenses such as hardwares, softwares and training of employees.  

Maintenance. Both extranet implementation and maintenance is made expensive within an organization.  

Dependency.  

System Protection.  

Communication Delay.  

User Friendliness.

Explanation:

A user calls to report that she is experiencing intermittent problems while accessing the wireless network from her laptop computer. She can access the network from her usual office, but today, she is trying to access the wireless network from a conference room, which is across the hall and next to the elevator. Which of the following is the MOST likely cause of her connectivity problem?

a. The user has not yet rebooted her laptop computer while at her new location.
b. The user needs a new IP address because she is working on a different floor.
c. The wireless network access point on the user's normal floor has failed.
d. The user is out of the effective range of the wireless access point on her floor.
e. The user has not yet logged off and back on to the network while at her new location.

Answers

Answer:

d. The user is out of the effective range of the wireless access point on her floor.

Explanation:

in this code how many times will it repeat? for(i = 0; i < 8; i++) {forward();}

Answers

Answer:

It will repeat 8 times. because in the statement above the variable i has to be more then 8, so until the variable i has the value of it it will repeat. So it will repeat 8 times .

Write a program whose input is a string which contains a character and a phrase, and whose output indicates the number of times the character appears in the phrase. Ex: If the input is: n Monday the output is: 1 Ex: If the input is: z Today is Monday the output is: 0 Ex: If the input is: n It's a sunny day the output is: 2

Answers

Answer:

import java.io.*;  

public class Main {

   public static void main(String[] args) throws IOException {

       BufferedReader in = new BufferedReader(new InputStreamReader(System.in));

       String s;

       while ((s = in.readLine()) != null) {

           int total = 0;

           for (char character : s.toCharArray()) {

               if (s.charAt(0) == character) {

                   total++;

               }

           }

           System.out.println(total - 1);

       }

   }

}

Explanation:

We start the program by using the BufferedReader which will allow input from the user.

Then, we create a variable String that will take the input from the user.

Since the problem is asking us for the total number of times that the specified character appeared in the String, we will have to iterate over that String and count every time the character is found.

For this, I initialized an integer variable total, that takes count every time the character is found.

Using a for each loop, I converted the string to a character array (e.g. instead of a String "Monday", it will now look like {"M", "o", "n", "d", "a", "y"). It will iterate for each character it finds and checks if the character at position 0 is the same as the character at position i.

If the condition is true, then the total will increment by one.

But the problem is, since we converted the string into a character array to validate each character, the initial character will also add to the sum. So for "n Monday", it will take the first n, and add the total + 1.

Without specifying total - 1, "n Monday" will output 2 since there are two total "n".

There is a limitation, which wasn't specified in the problem statement anyway, but it's good to be aware of in case you need to solve it. If you want to check all of the characters that must equal the character you want to validate, irrespective of upper or lowercase, you will have to convert the string to lowercase first, so that the program will take the uppercase letters into account as well.

For that, before the for each statement, simply add s = s.toLowerCase();

Just take points, this website is so weird because of all the reporting and I didn't do any thing

Answers

Answer:

I agree with you! And thank you for the points

Explanation:

I answer educational questions and ask one of my own regarding math and it gets reported

Someone asked if their art was good and how they can improve it and it gets reported

But the only questions they don’t report are free po!nts

For the people who don’t have anything better to do then report people trying to get help: STOP ITS ANNOYING NOT JUST FOR ME BUT THE PEOPLE WHO ARE TRYING TO GET HELP, INSTEAD OF REPORTING WHY DONT U HELP PEOPLE???

Answer:but this is free ponts so it is safe uggg

Which hacking technique uses network monitoring devices?

Sniffing
Shoulder surfing
Physical security threat
Wire tapping

Answers

Answer:

The answer is sniffing, because sniffing is a process that captures all the data packets, when the network is mentioned.

4.) Food cost for your restaurant is about $.38 on the dollar. That means for every dollar
in sales, you spend 38 cents in food cost.
Figure out the food costs for the following days' sales:
Monday: $3,459.00
Tuesday: $2,976.81
Wednesday: $3,185.32
Thursday: $3,562.91

Answers

Answer:

38 cents on the dollar means that the cost is 38%. So for each of the costs, multiply by 0.38 (38%) to get the cost.

$3459*0.38=$1314.42

$2976.81*0.38 = 1131.1878 or about $1131.19

etc.

An HTML sitemap provides a list of internal links on a website accessible to users

Answers

The answer is true edg 2025 The distinction between XML and HTML sitemaps is that XML sitemaps are written for search engines, whereas HTML sitemaps are written for humans. An XML sitemap is designed especially for search engine spiders. An HTML sitemap helps lost human users locate the page they’re searching for on your website. SEO Site Checkup’s sitemap tool is a fast and simple one to try – simply enter your URL and let them see if they can locate your sitemap. Second, you could try crawling your website with Spotibo by creating a free account. Then, to see if you have a sitemap, you’d have to search at just the XML file forms

Use the drop-down menus to complete statements about safe and blocked senders lists.
*Safe *Blocked *repeatedly

Answers

Answer:

it already has an answer and it's right so i don't see the point to needing to answer this

one Q what will be the answer?

Answers

Answer: a computer system that has one function within a large system

Explanation:

the key word here is EMBEDDED which means WITHIN SOMETHING ELSE

You have a computer that has four DDR2 memory slots. Currently, there are two 512 MB memory modules installed. You check the motherboard documentation and find that the system has a 4 GB memory limitation. You want to add more memory to this system. By adding new memory modules, and without replacing the existing memory modules, what is the maximum total amount of usable RAM you can have in this system

Answers

Answer:

2048 MB / 2 GB.

Explanation:

Without removing the other modules you can add two more 512 MB modules for a total of 2048 MB.

which type of malware typically displays, automatically plays, or downloads advertisements to your computer?

Answers

Answer:

Adware

Explanation: Adware displays pop-up advertisements when you are online.

Other Questions
Giving brainliest if you answer this correct. A bag contains 6 red and 10 black marbles. If you pick a marble from the bag, what is the probability that the marble will be black? Write it in fraction, decimal, and percent. 100 points HELP ASAP!!!!!This question has two parts. First, answer part A. Then, answer part B. ill put story at bottomPart AWhat is the purpose of the first paragraph of the article? A. to tell where the Eiffel Tower and Hoover Dam are located B. to show just how different the Eiffel Tower and Hoover Dam are C. to explain what is meant by the phrase marvels of engineering D. to describe how one type of material was used to make different structuresPart BWhich detail from the text best supports your answer in part A? A. Its hard to imagine two more different structures . . . B. Everyone expected it to remain in place for many, many years. C. Each piece had to be the right size and shape. D. Teams of people worked to take out the bolts and put in the rivets.MARVELS OF ENGINERINGIts hard to imagine two more different structures than the Eiffel Tower and Hoover Dam. For one thing, the Eiffel Tower is in Paris, France, and Hoover Dam is on the border between Nevada and Arizona. The Eiffel Tower is elegant and delicate looking, but Hoover Dam looks like a huge slab of concrete. The Eiffel Tower was made of many parts put together. But the concrete for Hoover Dam was poured at the site. The Eiffel Tower was built for a fair and was not intended to remain in place for long. Hoover Dam was built to allow water to be used in desert country and to create electricity. Everyone expected it to remain in place for many, many years.Even though these two structures are so different, there are similarities. Each required great effort to complete. Each also necessitated the involvement of many workers. The workers on each faced many challenges and difficulties, and each was built in a series of steps. Each is huge but was built quickly, considering the amount of labor involved.All of the Eiffel Towers parts were made in a factory near Paris. Each piece had to be the right size and shape. Smaller parts were put together and then joined to form a larger piece. These large pieces were put together at the site of the tower. Bolts held together the pieces made at the factory. At the tower, these bolts were pulled out and replaced with hot rivets. Teams of people worked to take out the bolts and put in the rivets.Hoover Dam was built to replace one that had been washed away, but it was built in a new place. Four tunnels were blasted through rock to cause the Colorado River to flow in new directions. Then the rivers canyon walls had to be cleared. From great heights, workers dangled from ropes. With only air below their feet, they prepared the area for great concrete walls. Far underneath them, the area for the foundation was cleared of mud and loose rock. When this was finished, tons of wet concrete were poured into a gigantic form. For thirty months, concrete was poured until the work was done. Across the Colorado River stood a dam 700 feet tall. When the water was allowed to rush through tunnels, it passed through giant rotary engines, and as their parts whirled, they created electricity.Making electricity and using water to irrigate dry land were both practical purposes for Hoover Dam. But the Eiffel Tower had no original purpose but to be beautiful. The man who designed it, Gustave Eiffel, looked for a practical use for it. The tower was more than a thousand feet tall, and it was a perfect place for a radio antenna. So, a radio station was built on the tower.Both the Eiffel Tower and Hoover Dam are popular tourist attractions. Each is considered a marvelous example of engineering skill. A car salesman sold a cat for $23,575, earning a commission of 4%. How much was his commission? ' Explica la postura del narrador en la presentacin del personaje de doa perfecta Find x when f (x)= 25 which of the following was not a characteristic of Dark ages Your aunt wants to buy a new house. She needs at least two bedrooms and a garage. You are helping her stick to her budget. Muebles $80.000 Casa $470.000 Reparaciones < > $50.000 Casa 1: I sell beautiful property of 175 m2 in the city. It has three bedrooms, two bathrooms, kitchen with dining room, living room, garage and a small balcony. It needs windows in the bedrooms. The windows cost twenty thousand dollars. He's got all the furniture. The price ordered is four hundred thousand dollars. 2: House of 130 m2 on sale. It has a garage, living room and dining room, a bedroom, a bathroom, kitchen and garden. The kitchen needs new cupboards, a stove and a new floor for sixty thousand dollars. It doesn't have a stove. I sell a stove for a thousand dollars with the purchase of the house. The price ordered is three hundred and eighty-five thousand dollars. 3: Property with living room, three bedrooms, kitchen and a bathroom. It has a small garage and a large patio. There are no flats in the property and the kitchen needs a sink. The kitchen has cupboards. The price for the floors and sink is thirty thousand dollars. The price ordered is two hundred and ninety-nine thousand dollars. Based on his budget and needs, which house or houses would be options for your uncle? 1st house 1st and 2nd house 1st and 3rd house 2nd house Why arent the snakes growing and thriving in the forest ecosystem? PLEAS HELP ILL GIVE BRAINLIESTSHOW WORK OR NO BRAINLIEST Does anyone know the answer to this?! In RST, s = 70 inches, t = 46 inches and R=109. Find T, to the nearest degree. a compound-complex sentence with the word photography This is geometry please help What is the value of [4-94720 -360-33-320-30 The interior volume of a refrigerator is 25 cubic feet. The overall dimensions of the refrigerator are 50 inches by 35 inches by 69 inches. What is the approximate difference between the entire volume of the refrigerator and its interior volume? Khloe invested $11,000 in an account paying an interest rate of 4.8% compounded continuously. Assuming no deposits or withdrawals are made, how much money, to the nearest ten dollars, would be in the account after 17 years? 14 Select the correct answer. Which marketing strategy is the most effective in the modern era? O A relationship marketing B. marketing mix OC. relationship marketing combined with the marketing mix D. considering the short-term Interests of society E. customer service Reset Next what is the answer pls help 5' 2" 2' 3" = What is the area of the figure?A. 44 sq cmB. 208 sq cmC. 192 sq cmD. 256 sq cm Weathering (breaking off sediments upriver), erosion (moving the sediments down river) and finally deposition caused the changes in the river. What helps hold sediments in place to prevent erosion?