If a program needs to respond to what the user inputs by printing one of three different statements, what will the program require? Group of answer choices database random number generator decision generator conditional statement

Answers

Answer 1

Answer:

B

Explanation:

Answer 2

Answer:

Answer B: random number generator

Explanation:

Computer programming is the process that professionals use to write code that instructs how a computer, application or software program performs. At its most basic, computer programming is a set of instructions to facilitate specific actions. If you're wondering what a computer programmer is, it's a professional that creates instructions for a computer to execute by writing and testing code that enables applications and software programs to operate successfully.


Related Questions

What are the qualities of strong leaders? Check all that apply. They inspire others. 1)They are easily influenced by others. 2)They are outstanding role models. 3)They have a strong sense of purpose. 4)They lack self-confidence.

Answers

Answer: 2 and 3
Explanation:

I would pick 2 and 3 based on process of elimination

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

Answers

Answer:

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

Convert the binary expansion of each of these integers to a decimal expansion. A) (1 1111)2 b) (10 0000 0001)2 c) (1 0101 0101)2 d) (110 1001 0001 0000)2

Answers

Step 3: Double the total and add the next leftmost digit. Repeat this until you run out of digits. Step 4: The result you get after adding the last digit to the previous doubled total is the decimal

What are three coding languages that are used to build websites?

Answers

Answer:

Python, Javascript, and Java

Explanation:

These are the main coding languages used for building most websites.

William brought some data into his Tableau Book, but the data had some null values and incorrect column headers. What did William have to do to clean up the data

Answers

William  had to manually edit the data if he wants to remove the null values and incorrect column headers.

What is data editing?

Data editing is known to be a term that connote the act of making changes, reviewing or adjustment  some survey data.

Note that by editing one can remove want one do not want from a group of data and as such,  William  had to manually edit the data if he wants to remove the null values and incorrect column headers.

Learn more about data from

https://brainly.com/question/26711803

#SPJ1

The page .Product contains data retrieved from an external system of record using a data page. How do you ensure .Product always contains the most current data from the data page

Answers

Answer:

Select refer to a data page on .Product

Explanation:

Q:

The page .Product contains data retrieved from an external system of record using a data p…

A. Select Refer to a data page on .Product.

B. Select Copy data from a data page on .Product...

A:

A

What do you call a software program that runs on a web server? Please respond ASAP! Please no comments unless you have a legit answer!

Answers

A software program that runs on a web server is a web browser

Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____.

Answers

Answer:

✓ two-tier architecture

Explanation:

Because the clients and the server perform different functions and can run two different operating systems, there is an arrangement of client/server architecture known as ____.

✓ two-tier architecture

Which of the following statements best describes the future of mass media?
O We will always need mass media, but because of social media, we will rely on it less.
O Although we still need it now, we will one day no longer need mass media because of social media.
o We no longer need mass media at this point in our culture because of our use of social media.
O It is likely that we will always need mass media, because social media cannot last.

Answers

The option that best describes the future of mass media is We will always need mass media, but because of social media, we will rely on it less.

What is the growth of mass media like?

The use of the mass media in recent times is one that is known to be   growing rapidly in terms of  the kinds of electronic media forms used, the number of TV stations and others. ,

Conclusively, The option that best describes the future of mass media is We will always need mass media, but because of social media, we will rely on it less because the use of social media may outweigh the use of mass media.

Learn more about mass media from

https://brainly.com/question/26152499

#SPJ1

Answer:

A.) We will always need mass media, but because of social media, we will rely on it less

Mass media refers to forms of communication that reach large audiences, such as television, radio, newspapers, and magazines. While social media has certainly had an impact on the way people consume information and connect with others, it is unlikely that mass media will become obsolete. However, it is likely that people will rely on mass media less as they increasingly turn to social media and other online sources for information and entertainment.

That being said, mass media still holds an important role in our society, providing us with news, entertainment, and other forms of information. As such, it is likely that mass media will continue to evolve and adapt to changing technologies and social trends in the future.

pivotetable are based on?

Answers

A pivot table is known to be based on the summary of your data and it is one that  report on different topics or trends.

What is pivot table?

This is known to be a kind of table that shows the summary of one's data, as they are said to be packaged in a chart.

Note that, A pivot table is known to be based on the summary of your data and it is one that  report on different topics or trends.

Learn more about pivot table from

https://brainly.com/question/15214258

#SPJ1

What is the device that converts a sign from binary or analog form into a signal of another form

Answers

Answer:

A digital-to-analog converter is a device that converts a discrete signal in the form of a binary digital quantity into an analog quantity based on a standard quantity (or reference quantity), referred to as a DAC or D/A converter. Electronic Basics #10: Digital to Analog Converter (DAC) Catalog Ⅰ Composition and characteristics

Explanation:

A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer. The printer seems to work fine for all other users. What is the most likely cause of the problem

Answers

Answer:

The printer driver is incorrectly installed by the user.

Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use

Answers

Q:

Abby has received a request for a data set of actual data for testing a new app that is being developed. She does not want the sensitive elements of the data to be exposed. What technology should she use?

A:

Masking

What is the first step you should take if unable to make bill payments on time?

Answers

Answer:

"talk to your landlord, creditors or bank about your financial situation to see if they can offer any leniency or a payment plan". just ask for extra time

Explanation:

How is a secure HTTP (HTTPS) different from a non-secured HTTP?
Secure HTTP is armed with a proxy service that inspects any incoming data.
O Secure HTTP is armed with a series of firewalls to protect it from potentially unsafe files.
O Secure HTTP is armed with passwords to ensure that only authorized users gain entry.
Secure HTTP is armed with secure socket layers to create another layer of security

Answers

Answer:

the second last option

Explanation:

secure HTTP is armed with passwords to ensure that only authorised users gain entry.

the data is encrypted during transmission

Write a Python program to solve the problem described above. Define a function satisfactory_meal(Meal) which takes a single parameter, Meal, and returns True or False. Meal is a list of lists of the form [Dish_number, Organic, Has_dairy, Has_meat, Locally_sourced] where the Dish_number is a positive integer and the other list items are 1 or 0. The function should return True if the meal is satisfactory, and should return False otherwise. You may assume that the Meal list will be in the correct format when the function is called; you do not have to error-check for a non-list or an incorrectly formed list. The dishes in list Meal are not necessarily sorted by dish numbers or any other order. In your program, you may write and call any additional functions that are helpful in the computation. Examples: satisfactory_meal([ [8, 0, 0, 0, 1], [9, 1, 1, 0, 1], [23, 1, 0, 0, 1], [2, 1, 0, 1, 0], [6, 0, 0, 1, 1] ]) should return True, satisfactory_meal([ [4, 1, 0, 0, 0], [7, 0, 1, 0, 1], [90, 0, 0, 0, 0], [3, 0, 0, 1, 1] ]) should return False, and satisfactory_meal([ ]) should return False.

Answers

def dx(fn, x, delta=0.001):

   return (fn(x+delta) - fn(x))/delta

def solve(fn, value, x=0.5, maxtries=1000, maxerr=0.00001):

   for tries in xrange(maxtries):

       err = fn(x) - value

       if abs(err) < maxerr:

           return x

       slope = dx(fn, x)

       x -= err/slope

   raise ValueError('no solution found')

The three main objectives of information security are.

Answers

Answer:

confidentiality, integrity, availability

Explanation:

Confidentiality: Data and information assets must be confined to people who have authorized access and not disclosed to others

Integrity: Keeping the data intact, complete and accurate, and IT systems operational

Availability: An objective indicating that information or system is at disposal of authorized users when needed.

What term refers to a hacker that uses
technology to announce or deliver a social,
ideological, religious. or political message?

Answers

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

this ingredient is often used as decoration for both hot and cold dessert​

Answers

Answer: cream

Explanation: Cream This ingredient is often used as a decoration or accompaniment for both cold and hot desserts, but may also be used as one of the recipe ingredients.

Please mark as brainliest

Select the correct term to complete the sentence.

A is an application with browser functionality embedded within an application written for a specific platform.


A is an application run through a browser enabling cross-platform access.


A is an application written for a specific device and operating system.

Answers

Answer:

A program that searches a database for specific words and returns a list of webpages or documents in which the search term was found. ... A _____ is an application that runs in a

Explanation:

First blank: Hybrid App

Second Blank: Web App

Third blank: Native App

PROOF:

Often, a single source does not contain the data needed to draw a conclusion. It may be necessary to combine data from a variety of sources to formulate a conclusion. How could you do this in this situation of measuring pollution on a particular river?

Answers

To measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.

What is pollution?

Pollution is the mixing of unwanted or harmful things in any substance or compound.

Water pollution is the mixing of toxics and chemicals in water.

Thus, to measure the pollution of a particular river, one must take the sample of the river and take the sample of pure water, then draw the conclusion, it will tell the amount of pollution in the river water.

Learn more about pollution

https://brainly.com/question/23857736

#SPJ1

Soft skills high module 7

Answers

Yes this is the fight answer I hope it helps

7.6.8: What's in a Name? code hs help

Answers

The exercise here is to write a code that prints the result "What's in a Name?". See the soluton for this below.

What is the code for the above exercise?

The CodeHS that states: "What 's in a name?" is:

print('Hello,', input('What's in a name? '))

CodeHS refers to an online platform for learning that is interactive. It offes turorials on general computer science knowledge as wella s programming.

Learn more about CodeHS at

https://brainly.com/question/15599262

#SPJ1

Type the correct answer in the box. Spell all words correctly.////////////////////////////////////////////////////////
////////////////////////////////////////////////////////In a manufacturing system, a sensor determines whether a furnace is at an appropriate temperature. The sensor’s information governs the flow of fuel to the furnace. Identify the elements of this manufacturing system.////////////////////////////////////////////////////////
This particular manufacturing system has an additional fourth element known as
.

Answers

Answer:

Where are the words to put in

Explanation:

Answer:

mm I dont understand where do the words go

Explanation:

Which part of the nist cybersecurity frameworks defines the activities needed to attain the different cybersecurity results?.

Answers

The part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.

What is cybersecurity?

The term 'cybersecurity' makes reference to the strategies aimed at protecting information on the deep web.

Cybersecurity techniques are fundamental to protect sensitive data such as passwords from hackers.

In conclusion, the part of the NIST framework that defines the activities to attain different cybersecurity results is the Framework core.

Learn more  about cybersecurity here:

https://brainly.com/question/17579545

#SPJ1

By default, how many levels does the outline view contain?.

Answers

Answer:

Nine

Explanation:

By default, how many levels does the Outlining View contain? Nine.

Find the 66th term of the arithmetic sequence
25,10,−5

Answers

Answer:

the answer is 33825

Explanation:

Answer:

-950

Step-by-step explanation:

Arithmetic sequence=a+(n-1)d

a=first number

n=nth term

d=difference

a=25

n=66

d=-15

So let's solve

25+(66-1)(-15)

25+(65)(-15)

25-975

-950

So the 66th terms is -950

A combination of numbers and symbols used to express a calculation. Question 11 options: Formula Formula Bar Worksheet Workbook

Answers

Answer:

Formula

Explanation:

Formulas are functions that can express a calculation.

A small publishing company has a network design such that when a broadcast is sent on the lan, 200 devices receive the transmitted broadcast. how can the network administrator reduce the number of devices that receive broadcast traffic?

Answers

The network administrator reduce the number of devices that receive broadcast traffic  and Segment the LAN into smaller LANs and route between them.

What is this segmentation about?

By segmenting the one big network into a smaller network, the network administrator is one that has developed two smaller broadcast domains.

Therefore, in the scenario above, The network administrator reduce the number of devices that receive broadcast traffic  and Segment the LAN into smaller LANs and route between them.

Learn more about  network administrator from

https://brainly.com/question/20424057

#SPJ1

Glenda is searching airline schedules on HolApp, a mobile Web application. While browsing the application, a banner appears on the mobile screen showcasing offers and discounts on air tickets. The banner is best referred to as a(n) ________.

Answers

Answer:

online display advertisement

Explanation:

Q:

Glenda is searching airline schedules on HolApp, a mobile Web application. While browsing …

A. online display advertisement

B. contextual advertisement...

A:

A

Other Questions
Is 5 inches bigger than 1/3 if a foot FFABunitsG is the centroid of triangle ABC.What is the value of x?What is the length of segment DG?What is the length of segment AG?What is the length of segment AD?x + 2unitsunitsX-15GGDEC Which verb or verb phrase signals an inappropriate shift in mood? We are delighted to confirm your interview for next Monday at 11:00 a.m. Bring your resume with you, and will you please arrive 10 minutes early to fill out some paperwork? The manager will ask you about your experience. Then you will have to show us that you know how to use design software. You will be able to park in our main lot. The doorman will show you to our office.A. BringB. delighted to confirmC. will be able to parkD. will you please arrive PLEASE HELPPPP!!!!!Historical Question:How might the conflicts that led to the Walla Walla Treaties of 1855, the wars that followed the treaty council meeting, and the economic, cultural, and spiritual devastation to those treaty tribes been alleviated or prevented?For this assignment, perform these steps:First, review your research from Part I. Review the sources you found, so that you have them handy.Now, considering the historical question and the information you have gathered in your research, decide what conclusion is supported by the evidence. Expand this idea into a more detailed claim.Looking over the research notes you have gathered, consider how this evidence and reasoning supports your claim.Organize your research notes into the Outline Table. This outline will help you turn your notes into a well-crafted essay or presentation.To get the best grade possible, follow the instructions in the assignment closely and answer all of the questions completely. The outline portion of the assignment is worth 20 points.Submit the following documentation to your instructor:Filled-in Outline Table. (Add pages if more space is needed.) This assignment is worth 20 points.Outline for Opinion Essay or PresentationTo prepare the outline for your paper or presentation:State a claim related to an historical question and support the claim with evidence.Provide evidence, using multiple sources from multiple points of view.Address a counterclaim: consider the strengths and weaknesses not only of your position but also of opposing positions.Summarize the claim and evidence at the end.Opinion Claim Evidence and Reasoning Address a Counterclaim Restate opinion and summarize Find the value of of the thing-[tex]5(x+4)=40[/tex] 6. What is everyone in North Korea trained to do since birth? Which consideration must a society address when deciding for whom to produce a potentially scarce or limited resource?. Find the value of X. how do i do this question? What is regional development? 1.Mary has ( 20xy - 10x) sweets. She wants to divide the sweets equally among her (5x) friends. if X=6 and Y=4, how many sweets:how many friends does Mary have? help pls, thank you !! Sarah was solving an equation for her Algebraclass. She wrote down the equation she got on apiece of paper after completing step 2.-3m = 2m + 20Which equation below would represents whatalgebraic property she used in step 2? If a solution has 17.2 moles of LiF in 2000 mL of water, what is the molarity?4.2 M10 M2 M8.6 M Which equation is valid in the x axis for any projectile? Suppose you are babysitting your little brother. in spanish tell him to do three things using the verbs hacer, ir, and ser example: ve a tu cuatro. Gavin constructed a model building and wants to cover the outside with paper. How much paper will he need to cover the entire model? Alexis is studying how lenses work. She looks through a magnifying glass and through the peephole of a door.Which best describes a difference between the lenses used in these two devices?The lens in the magnifying glass can produce both real and virtual images, but the lens in the peephole can produce only real images. The lens in the magnifying glass can produce only real images, but the lens in the peephole can produce both real and virtual images. The lens in the magnifying glass can produce both upright and inverted images, but the lens in the peephole can produce only upright images. The lens in the magnifying glass can produce only inverted images, but the lens in the peephole can produce inverted and upright images. is the moon a star or a satellite what part of a plant is needed to propagate a new plant?