Answer:
Media provides a framework for understanding the media and helps enable us to interpret and evaluate media messages for ourselves. Media literacy skills are closely related to critical thinking skills, as they challenge us to think more deeply about not only what we see, but what we know. Like geography, because the media define for us our own place in the world. Like science and technology, the media help us to learn technology by adopting the leading edge of modern technological innovation.
Explanation:
Write a method called classAttendence() that creates a 10-by-10 two-dimensional array and asks for user input to populate it with strings of student names. The method should not return any values.
Answer:
The method written in Java is as follows:
public static void classAttendance(){
Scanner input = new Scanner(System.in);
String[][] names = new String[10][10];
for(int i =0;i<10;i++){
for(int j =0;j<10;j++){
System.out.print("Student Name: "+(i+1)+" , "+(j+1)+": ");
names[i][j] = input.nextLine();
}
}
}
Explanation:
This defines the classAttendance() method
public static void classAttendance(){
Scanner input = new Scanner(System.in);
This declares the 2D array of 10 by 10 dimension as string
String[][] names = new String[10][10];
This iterates through the rows of the array
for(int i =0;i<10;i++){
This iterates through the columns of the array
for(int j =0;j<10;j++){
This prompts user for student name
System.out.print("Student Name: "+(i+1)+" , "+(j+1)+": ");
This gets the student name from the user
names[i][j] = input.nextLine();
}
}
The method ends here
}
See attachment for complete program that include main method
Question #1 Mutiple Select Which features are important when you plan a program? Select 4 options. Knowing what you want the program to do. Knowing how to find the result needed. Knowing what the user needs the program to accomplish. Knowing now many lines of code you are allowed to use Knowing what information is needed to find the result.
Answer:
In planning a program, the following features are important.
- Knowing what you want the program to do.
- Knowing how to find the result needed.
- Knowing what the user needs the program to accomplish
- Knowing what information is needed to find the result
You start out by planning on what you want to create. Then you think of what programming language to use. The features to be included and then the task you want this program to accomplish
Answer:A,C,D,E
Explanation:
The development methodology where each part of a project is done in order after each other is called:
Bruh this a duplicate
help quick please…….
Answer:
var string1 = prompt("Enter a value");
Explanation:
The answer depends on the language used, but I'm assuming it is a webbrowser with javascript.
I don’t know what nut this is anyone know
Answer:
tee nut i think
Explanation:
There are many definitions for a word, this is called
Answer: Polysemous
Explanation: I hope this helps please like
write c++ program to find maximum number for three variables using statement ?
please help me..
Answer:
int a, b, c;
cin >> a >> b >> c;
max = (a>b) ?
(a > c ? a : c) :
(b > c ? b : c);
cout << max;
The IPv4 address scheme has enough IP addresses to give every blade of glass in the world its own unique IP. True False
Answer:
False
Explanation:
IPv4 address are composed of four octets (8 bit numbers), ranging from 0.0.0.0 to 255.255.255.255
All those 32 bits, in decimal notation, can form a total of
[tex]2^{32} = 4,294,967,296[/tex] different addresses.
Being more than 4 billion addresses and ignoring that some addressesare reserved for special uses, even present human population almost doubles that number.
So it is safe to state that IPv4 addresses is not enough to give every blade of grass its own IP.
_________ can be used to provide access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.
Answer:
IPSec
Explanation:
IPSec is an acronym for Internet Protocol Security. It is a standardized protocol used in determining the cryptographic and authenticated packets across the Internet Protocol networks.
It can be utilized to establish access control, confidentiality, data origin authentication, connectionless integrity, rejection of replayed packets, and limited traffic flow confidentiality.
Read the following code:
# Calculate totalCost of itemA with 6.5% tax
totalCost = itemA + .065
There is an error in the code. How should the code be revised in order to get the correct output?
totalCost = itemA * 0.065
totalCost = (itemA) + 0.065
totalCost = itemA * ( itemA + 0.065)
totalCost = itemA + (itemA * 0.065)
Answer:
answer is D
Explanation:
i took the test and sales tax is just multiple the tax with the price of the item
pls answer fast. Deciding when to quote an original e-mail is one challenge of effective communication. In which of the following e-mails should you quote the original e-mail? (select all that apply)
You respond to a price quote from a sales representative to tell them you need to think about the price.
You want to schedule a new meeting with a group you met with last week.
A coworker wants you to review an e-mail she is sending to a vender for clarity.
You want to start a new discussion with a contact who e-mailed you a newsletter a couple months ago.
Answer:
A,C
Explanation:
Answer: A&C
Explanation:
Cyberbullying can negatively impact a victim’s
well-being.
Answer:
Pyhsical Action!
Explanation:
I got it right on Edu: 2021!
To enforce the concept of separating class definition from its function implementations, where should the function implementations of a class be placed?
A. In a .h file.
B. In a.cpp file.
C. In the same file as the main() function.
D. In a .c file.
To enforce the concept of separating class definition from its function implementations, in a .c file, the function implementations of a class are placed. Thus, option D is correct.
What is implementation?Putting a strategy into motion is what is meant by the implementation. Beginning with a specific issue they want to address or a tactic they really want to implement, administrators create a plan to address it. This phrase can be used to represent the procedure by which formal plans—often highly intricate conceptual intentions that will have an impact on many—come to pass.
A file with the ending ".c" was created using the C programming language. The C file contains the software for every implementation of a software's functionality. The function versions of a class are contained in the a.c file to reinforce the idea of separating a class specification from its own function definitions.
Therefore, option D is the correct option.
Learn more about implementation, here:
https://brainly.com/question/13384905
#SPJ2
A task-oriented leader is ideal for a creative workplace.
O A.
True
OB.
False
Rese
Answer:
True
Explanation:
Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfiguration. Which protections accompany STP
Answer:
Any of the following:
1. Root Guard
2. BPDU Guard
3. BPDU Filtering
Explanation:
Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.
Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:
1. Root Guard
2. BPDU Guard
3. BPDU Filtering
In which program structure does the processor verify the mentioned condition only after executing the dependent statements once?
A. Switch Case Structure
B. Do While Structure
C. If Else Structure
D. For Structure
E. While Structure
1. Web-based applications are application software which operate and can
be accessed through
A. Intranets
B. The World Wide Web
C. Desktop applications
D. Storage hardware
Answer:
b.world wide web
Explanation:
The movie polar express was critically acclaimed due to the unbelievably lifelike movements of Tom Hanks character
Answer:
False
Explanation:
With that ------ outlook he doesn't trust anyone.
Answer:
Negative
Explanation:
If you have a negative outlook on everything, then nothing seems good, including people.
types of libraries in operating system
Answer:
Academic, Public, National & Special Library
Explanation:
A Brothers and sisters. I have none but that man's father is my father's son. Who is
that man? (Use a well tabelled diagram to answer this question)
Which form of data does the image represent? (10 points)
A. Analog data
B. Digital data
Assign a name range of RentalRates to cell range A37:B40
To assign name select cells A37:B40, in the Name Box type RentalRates, and then press enter.
What is cell range?A cell range in a spreadsheet is defined by the reference to the range's upper left cell (minimum value) and the reference to the range's lower right cell (maximum value).
When separate cells can be added to this selection, the range is referred to as an irregular cell range.
A named range is made up of one or more named cells. Formulas can be made easier to read and understand by using named ranges.
To assign a named range of RentalRates to cells A37:B40, select cells A37:B40, type RentalRates in the Name Box, and then press enter.
Thus, this way one can assign name to cell range.
For more details regarding cell range, visit:
https://brainly.com/question/15513083
#SPJ1
From this, you surmise that ROW and COL must have been compile-time constants. What are their values? (Hint: in order to answer this question, it helps to know how 2-dimensional arrays are stored in memory in row-major order.)
Answer:
The number of ROW or row of the 2-dimensional array is 2
The number of COL or column of the 2-dimensional array is 3
Explanation:
The C source code function fetch_aval which is programmed to return an integer value was compiled to the MIPS assemble code;
fetch_aval:
andi $5, $5,0x0007
sll $6,$6,2
sll $2,$5,3
subu $2,$2,$5
sll $2,$2,3
addu $2,$2,$4
addu $6,$6,$2
lw $2,0($6)
j $31
Where the statement "sll $6,$6,2" defines the row length of the array to be 2 (at the end of the statement) and "sll $2,$5,3" gives the column length of 3.
A driver should never interfere
with another driver passing
them.
True
False
The statement "A driver should never interfere with another driver passing them" is true.
What is driving?Driving, which includes operating and moving a vehicle in a controlled manner, includes using a car, motorcycle, truck, bus, or bicycle. The safest move is always to cede the right-of-way and allow the pass if you see another driver trying to pass you or expressing their intent to do so.
Any attempt to prevent the driver from passing you is exceedingly risky and may result in a collision. Drivers should not block each other ways in order for safe driving.
Drivers are expected to abide by the established road and traffic laws in the area they are traveling in order to receive permission to drive on public roadways.
Therefore, the statement is true.
To learn more about driving, refer to the link:
https://brainly.com/question/25351775
#SPJ2
Which part of the operating system handles input by the user and output from the computer?
Answer:
Your answer should be "disk access" if this question is from the source that I think it is from.
If that option is not available, update your post with the options.
what is the different between the simple statement and compound statement ?
Answer:
Following is the difference between Simple and Compound statement; Simple statement (sentence) is one which has only one subject and one predicate. A Compound statement (sentence) is one which has two or more independent clauses consisting of their own subject and predicate.
Explanation:
hope it helps you
Mark as brainliest.
And follow for a follow back
Suppose that L is a sorted list of 1,000,000 elements. To determine whether the x item is in L, the average number of comparisons executed by the sequential search algorithm is _____.
Answer:
≅500,000 comparisons.
Explanation:
The sequential search algorithm is, as its name express, a comparison method to search for a specific value in a list, sorted or not.
It starts with the first element in the list, compares the element with the searched value, if it is a match it stops, otherwise it moves to the next element and repeats.
In general, if the list size is X, the average number of comparisons is:
[tex]\frac{X+1}{2}[/tex]
Solving for X=1,000,000, the result is ≅500,000 comparisons.
What is the output for the following line of code?
# print(3)
O3
O'3
O There is no output.
O An error statement is generated.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct option for this question is: There is no output.
Because this is a Python code. and it is a comment statement. The code line that begins with the # symbol considered a comment statement. The comment statement code will not be executed when you run the program.
While the other options are not correct because:
The given line of code is considered as a comment statement. The comment statement will be executed on running the program. It is used for understanding the program that helps the program to read and understand the logic being written here. When you run the comment statement, it will not produce any output or error.
Answer: O There is no output.
Explanation:
The "#" is utilized as a comment statement in Python code. It is not meant to be put into effect when the program is ran.
(Confirmed on EDGE)
I hope this helped!
Good luck <3
frist step in science
Answer: Ask a question.