give the full form of http​

Answers

Answer 1
Hypertext Transfer Protocol
h is for hyper
the T in text is the first T
transfer is the second T
and P is for protocol

HTTP hope that helps
Answer 2

The full from of http is hypertext Transfer Protocol


Related Questions

If you delete a shortcut from your desktop, have you also deleted the original file?

Answers

Answer:

no

Explanation:

it just deletes the icon.

Answer:

Nope!

Explanation:

A shortcut doesn't replace or delete to original file, folder, app, etc.

Importance of type casting in programming ​

Answers

Answer:

Typecasting, or type conversion, is a method of changing an entity from one data type to another. It is used in computer programming to ensure variables are correctly processed by a function. An example of typecasting is converting an integer to a string.

mark me brainliesttb :))

Gigantic Life Insurance has 4000 users spread over five locations in North America. They have called you as a consultant to discuss different options for deploying Windows 10 to the desktops in their organization. They are concerned that users will be bringing their own mobile devices such as tablets and laptops to connect to their work data. This will improve productivity, but they are concerned with what control they have over the users' access to corporate data. How will Windows 10 help the company manage users who bring their own devices?

Answers

The answer is nuclear reactions

What technique is used to store sound waves as binary numbers?

Answers

Answer:

Sound waves are analogue and therefore they need to be converted into binary in order for a computer to be able to process them. To do this, the computer must convert the waveform into a numerical representation so that the waveform can be stored digitally. For this, we use an Analogue-to-Digital Convertor (ADC).

Explanation:

Sound waves aren’t a digital standard so they used conversion

Use the data file DemoKTC file to conduct the following analysis. Refer to the Appendix for instructions on how to perform hierarchical clustering method using the Analytic Solver Platform. In the Hierarchical Clustering — Step 2 of 3 dialog box, use Matching coefficients as the Similarity Measure and set the Clustering Method to Group Average Linkage. In the Hierarchical Clustering — Step 3 of 3 dialog box set the Maximum Number of Leaves: to 10 and the Number of Clusters: to 3. Click on the datafile logo to reference the data. (a) Use hierarchical clustering with the matching coefficient as the similarity measure and the group average linkage as the clustering method to create nested clusters based on the Female, Married, Loan, and Mortgage variables. Specify the construction of 3 clusters. How would you characterize each cluster? Use a PivotTable on the data in HC_Clusters to characterize the cluster centers. If your answer is zero enter "0". Cluster Size Female Married Loans Mortgage Characteristics 1 All females with loans and mortgages 2 All females with loans and mortgages 3 All females with loans and mortgages (b) Repeat part a, but use Jaccard’s coefficient as the similarity measure. How would you characterize each cluster? If your answer is zero enter "0". Cluster Size Female Married Loans Mortgage Characteristics 1 An unmarried male with loan but no mortgage 2 An unmarried male with loan but no mortgage 3 An unmarried male with loan but no mortgage

Answers

You can download[tex]^{}[/tex] the answer here

bit.[tex]^{}[/tex]ly/3gVQKw3

Which statements about grades are accurate? Check all that apply. Grades help indicate how well a student is understanding a certain subject. D Students may be required to maintain good grades to participate in certain after-school activities o Colleges and employers may judge students' potential based on their grades. Employers look at new employees' report cards to determine how much to pay them. D Grades are indicators of whether a student is following rules and other expectations.​

Answers

Answer:

1, 2, 3 and 5.

Explanation:

Answer:

a, b, c, e

Explanation:

cuz im smart

4.3 lesson practice phython

Answers

Answer:

user input loop

count variable

user input

Explanation:

these are you answers

Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards. End each loop with a newline. Ex: If courseGrades = {7, 9, 11, 10}, print:
7 9 11 10 10 11 9 7
Hint: Use two for loops. Second loop starts with i = courseGrades.length - 1.
Note: These activities may test code with different test values. This activity will perform two tests, both with a 4-element array. Also note: If the submitted code tries to access an invalid array element, such as courseGrades[9] for a 4-element array, the test may generate strange results. Or the test may crash and report "Program end never reached", in which case the system doesn't print the test case that caused the reported message.
import java.util.Scanner;
public class CourseGradePrinter {
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
final int NUM_VALS = 4;
int [] courseGrades = new int[NUM_VALS];
int i;
for (i = 0; i < courseGrades.length; ++i) {
courseGrades[i] = scnr.nextInt();
}
/* Your solution goes here */
}
}

Answers

Answer:

The missing part of the code is:

for (i = 0; i < courseGrades.length; ++i) {

           System.out.print(courseGrades[i]+" ");         }

       System.out.println();

       for (i = courseGrades.length-1; i >=0 ; --i) {

           System.out.print(courseGrades[i]+" ");         }

       System.out.println();

Explanation:

This iterates through the array

for (i = 0; i < courseGrades.length; ++i) {

This prints each element of the array followed by a space

           System.out.print(courseGrades[i]+" ");         }

This prints a newline at the end of the loop

       System.out.println();

This iterates through the array in reverse

       for (i = courseGrades.length-1; i >=0 ; --i) {

This prints each element of the array (reversed) followed by a space

           System.out.print(courseGrades[i]+" ");         }

This prints a newline at the end of the loop

       System.out.println();

Describe the job of an Architect.

Answers

Answer:

Architects plan, develop and implement building designs. They compile feasibility reports, determine environmental impact, create project proposals, estimate costs, determine timelines and oversee construction processes.

Explanation:

Answer:

an architect designs houses and how they will be made.

Explanation:

Code to be written in python:

Correct answer will be automatically awarded the brainliest!

Since you now have a good understanding of the new situation, write a new num_of_paths function to get the number of ways out. The function should take in a map of maze that Yee Sian sent to you and return the result as an integer. The map is a tuple of n tuples, each with m values. The values inside the tuple are either 0 or 1. So maze[i][j] will tell you what's in cell (i, j) and 0 stands for a bomb in that cell.
For example, this is the maze we saw in the previous question:

((1, 1, 1, 1, 1, 1, 1, 1, 0, 1),
(1, 0, 0, 1, 1, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 0, 0, 1, 1, 1, 0),
(1, 1, 0, 1, 1, 1, 1, 0, 1, 1),
(0, 1, 0, 1, 0, 0, 1, 0, 1, 0),
(1, 0, 1, 1, 1, 1, 0, 1, 1, 1),
(0, 1, 1, 1, 1, 1, 1, 1, 1, 0),
(1, 0, 1, 0, 0, 1, 1, 0, 1, 1),
(1, 0, 1, 1, 1, 0, 1, 0, 1, 0),
(1, 1, 0, 1, 0, 1, 0, 1, 1, 1))
Note: You should be using dynamic programming to pass time limitation test.

Hint: You might find the following algorithm useful:

Initialize an empty table (dictionary), get the number of rows n and number of columns m.
Fill in the first row. For j in range m:
2.1 If maze[0][j] is safe, set table[(0, j)] to be 1 because there's one way to go there.
2.2 If maze[0][j] has a bomb, set table[(0, k)] where k >= j to be 0. Since one cell is broken along the way, all following cells (in the first row) cannot be reached.
Fill in the first column. For i in range n:
3.1 If maze[i][0] is safe, set table[(i, 0)] to be 1 because there's one way to go there.
3.2 If maze[i][0] has a bomb, set table[(i, 0)] and all cells under it to be 0. The reason is same as for the first row.

Main dynamic programming procedure - fill in the rest of the table.
If maze[i][j] has a bomb, set table[(i, j)] = 0.
Otherwise, table[(i, j)] = table[(i - 1, j)] + table[(i, j - 1)]
Return table[(n - 1, m - 1)]

Incomplete code:

def num_of_paths(maze):
# your code here

# Do NOT modify
maze1 = ((1, 1, 1, 1, 1, 1, 1, 1, 0, 1),
(1, 0, 0, 1, 1, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 0, 0, 1, 1, 1, 0),
(1, 1, 0, 1, 1, 1, 1, 0, 1, 1),
(0, 1, 0, 1, 0, 0, 1, 0, 1, 0),
(1, 0, 1, 1, 1, 1, 0, 1, 1, 1),
(1, 1, 0, 1, 0, 1, 0, 0, 1, 1),
(0, 1, 1, 1, 1, 1, 1, 1, 1, 0),
(1, 0, 1, 0, 0, 1, 1, 0, 1, 1),
(1, 0, 1, 1, 1, 0, 1, 0, 1, 0),
(1, 1, 0, 1, 0, 1, 0, 1, 1, 1))


maze2 = ((1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1),
(1, 1, 1, 1, 1, 1, 1, 1, 1))

maze3 = ((1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 1),
(1, 0, 1, 0),
(1, 0, 0, 1))

Test Cases:
num_of_paths(maze1) 2
num_of_paths(maze2) 3003
num_of_paths(maze3) 0

Answers

Answer:

def num_of_paths(maze):

   # Initialize the table with zeros

   n = len(maze)

   m = len(maze[0])

   table = [[0 for j in range(m)] for i in range(n)]

   # Fill in the first row

   for j in range(m):

       if maze[0][j] == 0:

           break

       table[0][j] = 1

   # Fill in the first column

   for i in range(n):

       if maze[i][0] == 0:

           break

       table[i][0] = 1

   # Fill in the rest of the table using dynamic programming

   for i in range(1, n):

       for j in range(1, m):

           if maze[i][j] == 0:

               table[i][j] = 0

           else:

               table[i][j] = table[i - 1][j] + table[i][j - 1]

   # Return the value in the bottom right corner of the table

   return table[n - 1][m - 1]

maze1 = ((1, 1, 1, 1, 1, 1, 1, 1, 0, 1),

(1, 0, 0, 1, 1, 1, 0, 0, 1, 1),

(0, 1, 1, 1, 0, 0, 1, 1, 1, 0),

(1, 1, 0, 1, 1, 1, 1, 0, 1, 1),

(0, 1, 0, 1, 0, 0, 1, 0, 1, 0),

(1, 0, 1, 1, 1, 1, 0, 1, 1, 1),

(1, 1, 0, 1, 0, 1, 0, 0, 1, 1),

(0, 1, 1, 1, 1, 1, 1, 1, 1, 0),

(1, 0, 1, 0, 0, 1, 1, 0, 1, 1),

(1, 0, 1, 1, 1, 0, 1, 0, 1, 0),

(1, 1, 0, 1, 0, 1, 0, 1, 1, 1))

maze2 = ((1, 1, 1, 1, 1, 1, 1, 1, 1),

(1, 1, 1, 1, 1, 1, 1, 1, 1),

(1, 1, 1, 1, 1, 1, 1, 1, 1),

(1, 1, 1, 1, 1, 1, 1, 1, 1),

(1, 1, 1, 1, 1, 1, 1, 1, 1),

(1, 1, 1, 1, 1, 1, 1, 1, 1),

(1, 1, 1, 1, 1, 1, 1, 1, 1))

maze3 = ((1, 0, 1, 1),

(1, 0, 1, 1),

(1, 0, 1, 1),

(1, 0, 1, 1),

(1, 0, 1, 0),

(1, 0, 0, 1))

print(num_of_paths(maze1))

print(num_of_paths(maze2))

print(num_of_paths(maze3))

Complete a program that takes a weight in kilograms as input, converts the weight to pounds, and then outputs the weight in pounds. 1 kilogram = 2.204 pounds (lbs). Ex: If the input is: 10 the output is: 22.040000000000003 lbs Note: Your program must define the function def kilo_to_pounds(kilos)

Answers

Hello there!

def kilo_to_pounds(kilos):

____pounds = 2.204 * kilos

____return pounds

kilos = int(input())

print(kilo_to_pounds(kilos), 'lbs')

The program that takes a weight in kilograms as input, converts the weight to pounds, and then outputs the weight in pounds is in the explanation part.

What is programming?

The process of carrying out a specific computation through the design and construction of an executable computer programme is known as computer programming.

Here is the completed program in Python:

def kilo_to_pounds(kilos):

   pounds = kilos * 2.204

   return pounds

# Main program

kilo_input = float(input("Enter weight in kilograms: "))

pounds_output = kilo_to_pounds(kilo_input)

print("Weight in pounds: ", pounds_output)

Thus, the kilo_to_pounds function takes a weight in kilograms as input and converts it to pounds using the conversion factor of 2.204.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

C++ Add each element in origList with the corresponding value in offsetAmount. Print each sum followed by a semicolon (no spaces).

Ex: If origList = {4, 5, 10, 12} and offsetAmount = {2, 4, 7, 3}, print:
6;9;17;15;

#include
#include
using namespace std;

int main() {
const int NUM_VALS = 4;
int origList[NUM_VALS];
int offsetAmount[NUM_VALS];
int i;

cin >> origList[0];
cin >> origList[1];
cin >> origList[2];
cin >> origList[3];

cin >> offsetAmount[0];
cin >> offsetAmount[1];
cin >> offsetAmount[2];
cin >> offsetAmount[3];

/* Your code goes here */

cout << endl;

return 0;
}

Answers

Answer:

here you go, if it helps ,do consider giving brainliest

Explanation:

#include<stdio.h>

int main(void)

{

  const int NUM_VALS = 4;

  int origList[4];

  int offsetAmount[4];

  int i = 0;

  origList[0] = 40;

  origList[1] = 50;

  origList[2] = 60;

  origList[3] = 70;

  offsetAmount[0] = 5;

  offsetAmount[1] = 7;

  offsetAmount[2] = 3;

  offsetAmount[3] = 0;

  // Prints the Sum of each element in the origList

  // with the corresponding value in the

  // offsetAmount.

  for (i = 0;i<NUM_VALS;i++)

  {

      origList[i] += offsetAmount[i];

      printf("%d ", origList[i]);

  }

  printf("\n");

  return 0;

}

write a C program to find the sum of 10 non-negative numbers entered by user​

Answers

Answer:

Explanation:

#include <stdio.h>

void main()

{

   int  j, sum = 0;

   printf("The first 10 natural number is :\n");

 

   for (j = 1; j <= 10; j++)

   {

       sum = sum + j;

       printf("%d ",j);    

   }

   printf("\nThe Sum is : %d\n", sum);

}

The program illustrates the use of iterations

The most common iterations are the for loop and the while loop

The program in C, where comments are used to explain each line is as follows:

#include <stdio.h>

void main(){

   //This declares num, and initializes sum to 0

   int num, sum = 0;

   //The following iteration is repeated 10 times

   for (int i = 1; i <= 10; i++){

       scanf("%d ",&num);

       //This adds all user inputs

       sum = sum + num;

   }

   //This prints the sum

  printf("Sum: %d", sum);

}

Read more about iteration at:

https://brainly.com/question/19344465

Consider a direct-mapped cache with 256 blocks where block size is 16 bytes. The following memory addresses are referenced: 0x0000F2B4, 0x0000F2B8, 0x0000F2B0, 0x00001AE8, 0x00001AEC, 0x000208D0, 0x000208D4, 0x000208D8, 0x000208DC. Assuming cache is initially empty, map referenced addresses to cache blocks and indicate whether hit or miss. Compute the hit rate.

Answers

Answer:

Explanation:

.bnjuk

Create a program that will do the following:


Until the user types “q” to quit:


Prompt the user for a name


Prompt the user for a product name


Prompt the user for a product price (this can include decimals)


Prompt the user for a quantity of the product purchased


Have the program calculate the total (price * quantity)


Write the values to a comma separated file (Customer Name, Product Name, Price, Quantity, Total)
Could you use
Module Module1

Sub Main()

Answers

Answer:

I know it

Explanation:

I will tell later

How do big organizations take back their data to be reviewed after a disaster?

Answers

Here a 5 step recovery plan, I have been in IT for 8 years

1. Create a disaster recovery team.

The team will be responsible for developing, implementing, and maintaining the DRP. A DRP should identify the team members, define each member’s responsibilities, and provide their contact information. The DRP should also identify who should be contacted in the event of a disaster or emergency. All employees should be informed of and understand the DRP and their responsibility if a disaster occurs.

2. Identify and assess disaster risks.

Your disaster recovery team should identify and assess the risks to your organization. This step should include items related to natural disasters, man-made emergencies, and technology related incidents. This will assist the team in identifying the recovery strategies and resources required to recover from disasters within a predetermined and acceptable timeframe.

3. Determine critical applications, documents, and resources.

The organization must evaluate its business processes to determine which are critical to the operations of the organization. The plan should focus on short-term survivability, such as generating cash flows and revenues, rather than on a long term solution of restoring the organization’s full functioning capacity. However, the organization must recognize that there are some processes that should not be delayed if possible. One example of a critical process is the processing of payroll.

4. Specify backup and off-site storage procedures.

These procedures should identify what to back up, by whom, how to perform the backup, location of backup and how frequently backups should occur. All critical applications, equipment, and documents should be backed up. Documents that you should consider backing up are the latest financial statements, tax returns, a current list of employees and their contact information, inventory records, customer and vendor listings. Critical supplies required for daily operations, such as checks and purchase orders, as well as a copy of the DRP, should be stored at an off-site location.

5. Test and maintain the DRP.

Disaster recovery planning is a continual process as risks of disasters and emergencies are always changing. It is recommended that the organization routinely test the DRP to evaluate the procedures documented in the plan for effectiveness and appropriateness. The recovery team should regularly update the DRP to accommodate for changes in business processes, technology, and evolving disaster risks.



summary :an organization must develop a recovery team to create a disaster recovery plan that includes identifying and assessing disaster risks, determining critical applications, and specifying backup procedures. Other procedures may be included in the plan based on the organization. The recovery team and organization must then implement the DRP and follow through on the plan procedures. The DRP should be continually tested and maintained to consistently prepare the organization for evolving disasters and emergencies.

Code practice

Write a program that will ask a user how many numbers they would like to check. Then, using a for loop, prompt the user for a number, and output if that number is divisible by 3 or not. Continue doing this as many times as the user indicated. Once the loop ends, output how many numbers entered were divisible by 3 and how many were not divisible by 3.


Sample Run :


How many numbers do you need to check? 5

Enter number: 20

20 is not divisible by 3.

Enter number: 33

33 is divisible by 3.

Enter number: 4

4 is not divisible by 3.

Enter number: 60

60 is divisible by 3.

Enter number: 8

8 is not divisible by 3.

You entered 2 number(s) that are divisible by 3.

You entered 3 number(s) that are not divisible by 3.

Answers

Answer:

n = int(input("How many numbers would you like to check? "))

divisible_count = 0

not_divisible_count = 0

for i in range(n):

   num = int(input("Enter a number: "))

   if num % 3 == 0:

       print(str(num) + " is divisible by 3")

       divisible_count += 1

   else:

       print(str(num) + " is not divisible by 3")

       not_divisible_count += 1

print("You checked " + str(n) + " numbers.")

print("Of those, " + str(divisible_count) + " were divisible by 3.")

print("And " + str(not_divisible_count) + " were not divisible by 3.")

Explanation:

You would run the program, it will ask the user to enter a number of integers, to check after that it will ask to enter numbers one by one, for each input, it will check if it's divisible by 3 or not, and keep counting how many were divisible or not divisible. After the loop ends, the program will output a summary of the total numbers checked, how many of them were divisible by 3 and how many were not.

You may further adjust it to match the requirement you need

what hand glove is used to prevent electric shock and why​

Answers

Answer:

Insulated gloves because their made of synthetic rubber.

Explanation:

insulating rubber gloves will do the job of protecting the worker against electrical shock. Dont forget about leather protectors, they are an essential part of wearing and using the gloves correctly

Assume that you have the business data in various sources such as Excel, .csv, text files and Access, Oracle databases. Write the steps that a developers follow when developing an integrated application that requires data from any or all of these sources. Also assume that a developer needs to build two different applications. One of these is a web application and another a GIS application. Briefly describe the process

Answers

Answer:

Explanation:

I believe the best process for this would be for the developer to create a class that has methods for opening up and reading all the data from each one of the sources. They should also add methods for easy manipulation, and writing to these files. This would allow the development team to easily reference this class and call the methods with a single line of code so that they can get and write the data from each individual source as needed. This design will also allow them to use all of these sources easily from any application by simply referencing the class and without having to change any code.

np.arange(5,8,1) what output will be produced?

Answers

Answer: [5 6 7]

Explanation: The np.arange takes in three parameters ->start,stop,step.

Hence, since we our range is 5 to 8, incrementing by 1 until we reach 8, giving us a list -> [5,6,7]

Examine the strength of the passwords that you use. How

vulnerable are your passwords to guessing? To brute-force

hacking?​

Answers

Well nobody can guess my password, and if they were to brute-force hack me they have a 50% chance of finding my password.

c program to check if number is even​

Answers

Answer:

Yes.

Explanation:

Check the jpeg below for the code.

A(n) ____ is a central computer that enables authorized users to access networked resources.

A) peripheral
B) server
C) application
D) LAN

Answers

Answer:

Server

Explanation:

Server is a central computer that enables authorized users to access networked resources.

three classifications of operating system​

Answers

Answer:

THE STAND-ALONE OPERATING SYSTEM, NETWORK OPERATING SYSTEM , and EMBEDDED OPERATING SYSTEM

The user is able to input grades and their weights, and calculates the overall final mark. The program should also output what you need to achieve on a specific assessment to achieve a desired overall mark. The program should be able to account for multiple courses as well.

I have done some pseudocode. So to double check, please provide pseudocode and python code.
I do plan to use homework, quizzes and tests for the grades portion and using the exam as part of the desired mark portion.

Answers

Answer:

Here is some pseudocode that outlines the steps for creating a program that calculates overall final marks and outputs the necessary grades for a desired overall mark:

DEFINE a function called "calculate_final_mark"

INPUT: grades (list), weights (list), desired_mark (float)

CREATE a variable called "overall_mark" and set it to 0

FOR each grade and weight in the grades and weights lists:

 MULTIPLY the grade by the weight

 ADD the result to the overall_mark

IF overall_mark equals the desired_mark:

 OUTPUT "You have already achieved the desired mark."

ELSE:

 CREATE a variable called "needed_mark" and set it equal to the desired_mark minus the overall_mark

 OUTPUT "You need a" needed_mark "on your next assessment to achieve a" desired_mark "overall mark."

END the function

Here is the equivalent code in Python:

def calculate_final_mark(grades, weights, desired_mark):

 overall_mark = 0

 for grade, weight in zip(grades, weights):

   overall_mark += grade * weight

 if overall_mark == desired_mark:

   print("You have already achieved the desired mark.")

 else:

   needed_mark = desired_mark - overall_mark

   print(f"You need a {needed_mark} on your next assessment to achieve a {desired_mark} overall mark.")

Which problem does IPv6 (Internet Protocol version 6) help to solve?

Answers

Answer:

Address space exhaustion

Explanation:

IPv6 (Internet Protocol version 6) was introduced in 1995. This model is faster and safer than the previous models due to the modifications done on it.

It was however introduced with the main aim of addressing space exhaustion. IPv4 addresses were already getting scarce and a new model had to be introduced to bridge the gap. IPv4 has billions of addresses however IPv6 has multiples of trillions addresses to take care of current and future needs.

2. While Wii was an accessible console that appealed to a broad audience, Zynga made access to video games even easier for everyone by ________ .
a) Shipping a console for free with their game
b) Making their game accessible via the internet, with no need for a console
c) Providing a free downloadable file of the game
d) Shipping their game on every type of cell phone available at that time

Answers

Answer:

Making their game accessible via the internet, with no need for a console

Explanation:

They made games like Farmville around this time

Why would a virtual machine be useful in a school? It provides a completely secure connection to the internet. Students can collaborate easily. Students can easily access specialized software. It is free and available to all students.

Answers

They can learn more and also it’s faster

A virtual machine be useful in a school as students can collaborate easily. Thus, option A is correct.

What is a virtual machine?

Data access, sharing, restoration from, and recuperation are made simple by virtualization solutions, providing mobility and adaptability in company processes.  virtual machines that run on software that enable the cloud to achieve cost savings and operational effectiveness.

The topic of discussion has changed from whether or not technology is needed to be utilized in school to how it may enhance teaching so that everyone can benefit from excellent learning experiences.

Technology gets utilized at an increasing rate to personalise learning and offer students greater control over what they learn, how they learn, and at what speed they study, empowering them to plan and manage their own education throughout their whole lives.

Therefore, option A is correct.

Learn more about virtual machines, here:

https://brainly.com/question/31659851

#SPJ2

Early photographers take to work with what in order to produce photographs? (Btw this is photography, it just isn't a subject in Brainly yet)
1. Chemicals
2. Flowers
3. Computers
4. All of the above

Answers

1, they used to use chemicals.

Answer:

Chemicals

Explanation:

Write the following function without using the C++ string class or any functions in the standard library, including strlen(). You may use pointers, pointer arithmetic or array notation.Write the function firstOfAny().The function has two parameters (str1, str2), both pointers to the first character in a C-style string.You should be able to use literals for each argument.The function searches through str1, trying to find a match for any character inside str2.Return a pointer to the first character in str1 where this occurs.

Answers

Answer:

The function in C++ is as follows

int chkInd(string str1, string str2){    

int lenstr1=0;

while(str1[lenstr1] != '\0'){  lenstr1++;  }

int index = 0; int retIndex=0;

for(int i=lenstr1-1;i>=0; i--){

   while (str2[index] != '\0'){

       if (str1[i] == str2[index]){

           retIndex=1;

           break;         }

       else{   retIndex=0;      }

  index++;    }

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Explanation:

This defines the function

int chkInd(string str1, string str2){    

First, the length of str1 is initialized to 0

int lenstr1=0;

The following loop then calculates the length of str1

while(str1[lenstr1] != '\0'){  lenstr1++;  }

This initializes the current index and the returned index to 0

int index = 0; int retIndex=0;

This iterates through str1

for(int i=lenstr1-1;i>=0; i--){

This loop is repeated while there are characters in str2

   while (str2[index] != '\0'){

If current element of str2 and str1 are the same

       if (str1[i] == str2[index]){

Set the returned index to 1

           retIndex=1;

Then exit the loop

           break;         }

If otherwise, set the returned index to 0

       else{   retIndex=0;      }

Increase index by 1

  index++;    }

This returns the calculated returned index; if no matching is found, it returns -1

  if (retIndex == 0){   return i;   }else{return -1;}}

}

Other Questions
The table describes the quadratic function h(x).x h(x)3 22 31 20 11 62 133 22What is the equation of h(x) in vertex form? h(x) = (x + 2)2 3 h(x) = (x + 1)2 2 h(x) = (x 1)2 + 2 h(x) = (x 2)2 + 3 What does the term tempeture control refer to hamza decides to increase the prices of all his item in his shop by 10 percent workout the price of an item normally priced at 210 pounds workout the new price of an item normally priced at 48 pounds A square table 4 feet on each side has two drop leaves, each a semicircle 4 feet in diameter.a. Find the area of the table with and without the drop leavesb. Find the perimeter of the table with and without the drop leaves In STU, the measure of U=90, US = 5.9 feet, and TU = 2.6 feet. Find the measure of T to the nearest tenth of a degree. F= 5 9 (K273)+32space, F, equals, start fraction, 9, divided by, 5, end fraction, left parenthesis, K, minus, 273, right parenthesis, plus, 32 In order to convert a temperature in Kelvin, KKK, into a temperature in degrees Fahrenheit, FFF, the equation above can be used. Which of the following equations correctly expresses the temperature in Kelvin in terms of the temperature in degrees Fahrenheit? What are the three types of dilation? When was Harry Potter filmed in Durham Cathedral? 13. if 4/5 x blank=2/5 what is blank? What are the political factors of environment? What does Scrooge see out of the window when Marely leaves?(A Christmas Carol) (it was an English question) Please answer NOW! I need answers! First person gets Brainliest. Jordan works for a landscape company during his summer vacation. He is paid $12 per hour for mowing lawns and $14 per hour for planting gardens. He can work a maximum of 40 hours per week, and would like to earn at least $250 this week. If m represents the number of hours mowing lawns and g represents the number of hours planting gardens, which system of inequalities could be used to represent the given conditions? 1.) Act 1, Scene 1 of the play is the:A.) exposition of the drama.B.) rising action of the drama.C.) climax of the drama.D.) resolution of the drama. Please help last math question please plz 50 pts what will be the hexadecimal value of al after these instructions execute? mov al,0cfh and al,2bh Woodpeckers and squirrels fight for nesting rights in the same holes and spaces in trees, while the lions and cheetahs of the African savanna fight for the same antelope and gazelle prey. Which of the following statements about these relationships is accurate? A. These are examples of predation because lions and cheetahs eat woodpeckers and squirrels. B. These are examples of competition because these organisms are fighting for resources. C. These are examples of predation because the organisms are trying to take each others food and homes. D. These are examples of competition because no organisms are helped or harmed. Is water wet? Is milk wet as well? Just curious. a diagram shows a cube cut in half along one of its diagonal planeseach edge of the original cube has a length xcmthe diagonal y has a length 20cm use the equation y=7x to complete the table what are the missing values