integrity is the ability to keep some piece of data a secret

Answers

Answer 1

Integrity is not the ability to keep some piece of data a secret.

What is integrity?

Integrity is a quality that refers to an individual's adherence to moral and ethical principles. It also implies honesty, fairness, trustworthiness, and reliability, as well as respect for oneself and others. The integrity of data is maintained through a combination of techniques, including confidentiality, reliability, and accuracy.

What is data?

Data is a collection of numbers, characters, or symbols that are processed and stored by a computer. Data may be collected, stored, and processed for many purposes, such as record-keeping, analysis, and decision-making.

What is ability?

Ability refers to the skill or capability to do something efficiently or effectively. It also refers to an individual's capacity to perform a task or function, and may be influenced by various factors such as knowledge, experience, talent, and training.

In conclusion, integrity is not the ability to keep some piece of data a secret, but rather a quality that refers to an individual's adherence to moral and ethical principles.

Ability, on the other hand, refers to an individual's capacity to perform a task or function, while data is a collection of numbers, characters, or symbols that are processed and stored by a computer.

Learn more about data:

https://brainly.com/question/31680501

#SPJ11


Related Questions

What is phishing? Answer

Answers

Answer:

Phishing is a type of online scam where an attacker sends a fraudulent email purporting to be from reputable companies, designed to deceive a person into revealing sensitive and personal information (card numbers, passwords etc).

Hope this helps.

to remove filter criteria from the filter by form grid, you _____.

Answers

To remove filter criteria from the "Filter by Form" grid, you clear the filter fields or delete the values entered in the filter criteria.

In the "Filter by Form" grid, you can specify filter criteria to narrow down the data displayed based on specific conditions. To remove the filter criteria, you need to clear the fields where the filter conditions are set. This can be done by deleting the values entered in those fields or by selecting and clearing the entire filter criteria section.

By clearing the filter fields or deleting the values entered in the filter criteria, you can remove the filter criteria from the "Filter by Form" grid.

You can learn more about Filter by Form at

https://brainly.com/question/30562305

#SPJ11

Henry wants to check to see if services were installed by an attacker. What commonly gathered organizational data can he use to see if a new service appeared on systems?

Answers

Organizational data describes an organization's core traits, internal structures, and operational procedures, as well as how it behaves as a corporate actor in various social and economic circumstances.

What is Organizational data?

The different kinds of data, established on which they are organized are given below:

Chronological data.Spatial data.Qualitative data.Quantitative data.

Organizational data describes an organization's core traits, internal structures, and operational procedures, as well as how it behaves as a corporate actor in various social and economic circumstances.

A data-driven, objective picture of your business can be made using organizational data modeling, which can help to offer quick access to empirical data.

To learn more about Organizational data refer to:

https://brainly.com/question/7622579

#SPJ4

Lynn would like to compare the tuition cost of three different colleges. Which type of chart would best display this data? Analogous Bar Diagram Scatter

Answers

Answer:

Bar chart

Explanation:

A bar chart or bar graph is used to present the data according to the categories in the form of rectangular bars. The data of each constituent is presented either vertically or horizontally. There are two axes on the bar chart. One of them represents one category while the other represents the value to be measured. The comparison among the data given can be easily found and analyzed using a bar chart.

The tuition cost of the three different colleges can be easily compared when the data can be presented in the bar chart.

Answer:

bar graph

Explanation:

which of the following are typically job responsibilities for an e-commerce analyst? select all that apply.

Answers

The options that typically job responsibilities for an e-commerce analyst are:

A - Analyze data from marketing campaigns.

B-  Draft social media copy and obtain approvals.

D - Follow SEO best practices.

What does a job in e-commerce entail?

E-commerce jobs are positions that carry out tasks required for the online buying and selling of goods and services. These positions might be found in a wide range of divisions and capacities, from marketing to distribution and business development.

Therefore, E-commerce business analysts examine, analyze, and interpret the results of online retail activity for websites and e-commerce stores. They are highly skilled data analysts who pinpoint opportunities for growth in online marketing and sales.

Learn more about analyst from

https://brainly.com/question/29376166
#SPJ1

Q:

which of the following are typically job responsibilities for an e-commerce analyst?

A

Analyze data from marketing campaigns.

B

Draft social media copy and obtain approvals.

C

Approve and disburse funds for marketing activities.

D

Follow SEO best practices.


Activity
You have learned about the graphical elements that you can add in a spreadsheet. Create your own spreadsheet using these elements.
Question 1
Create a chart using the sample data in the table below. Recollect the steps on how to create a chart, and explain the necessary steps based on
the data in the table. Mention what the x- and the y-axes state and your interpretation of the data represented in the chart.
Year Percentage Increase in Expenses
2005
25.3
2007
30
2009
35
2011
35.8
2014
40

please help

ActivityYou have learned about the graphical elements that you can add in a spreadsheet. Create your

Answers

Answer:

its a

Explanation:

the answer is a i am right

Answer:

Here are the steps I followed to create the chart on the Microsoft Excel spreadsheet.

I clicked the Insert option from the top toolbar.

I clicked the Chart option.

I clicked Chart Type, and selected the type of chart I wanted. The table above provides data on the increase in percentage of expenses over the years. I chose the Column chart to display this data graphically. The column chart is the best form of chart that can show variation between items.

I selected the Data Range. I specified the start and end values of the data set that I wanted to plot in the chart.

Under Chart Elements, I specified the title and legend for the chart. A legend makes it easy for a viewer to understand a titled graph.

The x-axis represents the year in my column chart, and the y-axis shows the percentage increase in expenses per year. With the help of this chart, I could see that every year the percentage in expenses has increased steadily, and reached the highest value in 2014.

Explanation:

This is really close to the sample answer, so I would be careful...

Which classes dont have constructors in java.

Answers

Answer:

Super class (not sure about this answer)

35 POINTS
In Java PLS
This program is the beginning of an automated order machine. You are programming the piece that gets the number of the order from the label sent to you by the ordering machine.

The ordering machine is simulated with user input. It sends a full label, such as “3. Veggie Burger”.



Fill in the missing code
Your task is to get the number out of the string. To do this, you need to isolate the number by using substring. Then use Integer.valueOf, a static method of Integer that takes a String and returns the integer value contained in the String.

The final program should look something like this

1. Hamburger
2. Cheeseburger
3. Veggie Burger
4. Nachos
5. Hot Dog

Enter label:
5. Hot Dog
Customer ordered number 5

This is the code given:
import java.util.Scanner;

public class PickupWindow
{
public static void main(String[] args)
{
// Create scanner object
Scanner input = new Scanner(System.in);

// Display menu
String menu = "1. Hamburger\n2. Cheeseburger\n3. Veggie Burger\n4. Nachos\n5. Hot Dog\n";

System.out.println(menu);

// Get customer order
System.out.println("Enter label: ");
String customerOrder = input.nextLine();

// Use substring to get the first character (the number)
String combo =

// Create an Integer object by using the static
// method Integer.valueOf(someString)
// to turn the string into an Integer

Integer comboNumber =

// Print out what the customer ordered
System.out.println("Customer ordered number "


}
}

Answers

Answer:

Complete the program as follows:

1. Replace

String combo =

with

String combo = customerOrder.substring(0);

2. Replace

Integer comboNumber =

with

Integer comboNumber = Integer.parseInt(combo);

Explanation:

Required

Fill in the missing codes

From the code given, there are only two gaps to be filled and they are:

1. String combo =

2. Integer comboNumber =

1. String combo =

The first is to get the first index of customerOrder using substring.

The syntax of this is:

variable.substring(0);

In this case, the syntax will be replaced with:

String combo = customerOrder.substring(0);

Where customerOrder represents the string variables

2. Integer comboNumber =

This is to convert combo from string to integer using parseInt

This is done as follows:

Integer comboNumber = Integer.parseInt(combo);

See attachment for complete code

Please help!!
The following are two different images that are encoded using the same algorithm. The images are each in a 5 by 5 grid of pixels where each pixel is black, white, red, green or blue.

The image on the left gets encoded and compressed down to 21 digits while the image on the right gets compressed down to 25 digits. Although the same algorithm was used to encode and compress these images, why are the end results a different length?


The algorithm was probably used improperly in the image on the right, causing it to be a longer length than it should have been.

Because this is a lossy compression, sometimes information is lost during the compression.

The amount of size reduction from compression depends on the amount of redundancy in the original data.

The image on the right uses more colored squares and therefore requires more digits to represent the pixels.

Please help!!The following are two different images that are encoded using the same algorithm. The images

Answers

Answer: The amount of size reduction from compression depends on the amount of redundancy in the original data.

The reason why the end results have a different length is because: C. The amount of size reduction from compression depends on the amount of redundancy in the original data.

What is a lossy compression?

A lossy compression is also referred to as irreversible compression and it can be defined as a type of data encoding (data compression algorithm) in which the data in a file such as an image, is removed by using inexact approximations, in order to reduce the amount of size of a file after decompression.

Since the same algorithm was used to encode and compress these images, the reason why the resulting images have a different length is simply because the amount of size reduction from compression depends on the amount of redundancy in the original image file (data).

Read more on lossy compression here: https://brainly.com/question/17542014

With the clients table in data sheet view, sort the records in ascending a to z order based on the values in the client name field

Answers

To sort the records in ascending A to Z order based on the values in the client name field, you can follow these steps:
1. Open the clients table in data sheet view.
2. Click on the header of the client name field to select the entire column.
3. Click on the Sort A to Z button in the Sort & Filter group on the Home tab of the ribbon.
4. The records will be sorted in ascending A to Z order based on the values in the client name field.

A datasheet, also known as a data sheet or spec sheet, is a document that provides technical information and specifications about a product, component, or system. Datasheets are commonly used in engineering, manufacturing, and other technical fields to help engineers, designers, and other professionals understand the technical details of a product or component.

The question is "With the clients table in data sheet view, sort the records in ascending a to z order based on the values in the client name field!"

Learn more about data sheet: https://brainly.com/question/2471127

#SPJ11

WILL GIVE BRAINLIEST IF DONE CORRECT
Write a program in PYTHON that will simulate an ATM machine. A user at this ATM machine can do one of 5 things:

1 – Deposit (adding money to the account)
2 – Withdrawal (removing money from the account)
3 – Balance Inquiry (check current balance)
4 – Transfer Balance (transfer balance from one account to another)
5 – Log Out (exits/ends the program)

Before a user can do any of those things, he/she must first enter his/her username and passcode. After 3 incorrect attempts at entering the username and password, the program will end. The list of legitimate users along with their user ID, passcode, and account balance is shown below.

Customer, Username, Password, Savings Account, Checking Account
Robert Brown, rbrown, blue123, $2500.00, $35.00
Lisa White, lwhite, red456, $500.00, $1250.00
Mark Black, mblack, green789, $750.00, $200.00


Once the user enters the username, password, and option choice correctly, process the transaction according to these rules:
Allow the user to make up to a maximum of 3 transactions at a time. After 3 transactions, the program will terminate and they must log in again.
After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer.

Also, note that the ATM doesn’t distribute or collect coins – all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message and count as a transaction.

Answers

Answer:

import sys

#account balance

account_balance = float(500.25)

##prints current account balance

def printbalance():

  print('Your current balance: %2g'% account_balance)

#for deposits

def deposit():

 #user inputs amount to deposit

 deposit_amount = float(input())

 #sum of current balance plus deposit

 balance = account_balance + deposit_amount

 # prints customer deposit amount and balance afterwards

 print('Deposit was $%.2f, current balance is $%2g' %(deposit_amount,

balance))

#for withdrawals

def withdraw():

 #user inputs amount to withdraw

 withdraw_amount = float(input())

 #message to display if user attempts to withdraw more than they have

 if(withdraw_amount > account_balance):

   print('$%.2f is greater than your account balance of $%.2f\n' %

(withdraw_amount, account_balance))

 else:

   #current balance minus withdrawal amount

   balance = account_balance - withdraw_amount

   # prints customer withdrawal amount and balance afterwards

   print('Withdrawal amount was $%.2f, current balance is $%.2f' %

(withdraw_amount, balance))

#system prompt asking the user what they would like to do

userchoice = input ('What would you like to do? D for Deposit, W for

Withdraw, B for Balance\n')

if (userchoice == 'D'): #deposit

 print('How much would you like to deposit today?')

 deposit()

elif userchoice == 'W': #withdraw

 print ('How much would you like to withdraw today?')

elif userchoice == 'B': #balance

 printbalance()

else:

 print('Thank you for banking with us.')

 sys.exit()

Answer:

account_balance = float(500.25)  print('Your current balance: %2g'% account_balance)  ('Deposit was $%.2f, current balance is $%2g' %(deposit_amount, balance)) print('$%.2f is greater than your account balance of $%.2f\n' % (withdraw_amount, account_balance))('Withdrawal amount was $%.2f, current balance is $%.2f' %  (withdraw_amount, balance)) ('How much would you like to deposit today?') ('How much would you like to withdraw today?') ('Thank you for banking with us.')

Explanation:

The simple answer

Your colleague has written a line of text in vi and now wants to delete the line, but save its contents in a buffer in case he decides to bring back the line he deletes. What do you recommend

Answers

When working with vi text editor, there are several ways to delete a line of text and save its contents in a buffer. Here are some of the ways to achieve this: Using the 'dd' command: One way to delete a line of text is by using the 'dd' command. This command deletes the current line of text and saves it in a buffer.

To access the buffer, type 'p' to paste the contents of the buffer after the current line. Here is an example:1. Place the cursor on the line you want to delete.

2. Type 'dd' and the line will be deleted.

3. Type 'p' to paste the contents of the buffer Using the 'yy' command: Another way to delete a line of text and save its contents in a buffer is by using the 'yy' command. This command yanks the current line of text and saves it in a buffer. To access the buffer, type 'p' to paste the contents of the buffer after the current line.

Here is an example:

1. Place the cursor on the line you want to delete.

2. Type 'yy' to yank the line.

3. Type 'p' to paste the contents of the buffer Using the 'd' and 'p' commands: A third way to delete a line of text and save its contents in a buffer is by using the 'd' and 'p' commands. This method is similar to using the 'dd' command, except that it requires two steps.

Here is an example:

1. Place the cursor on the line you want to delete

2. Type 'dd' to delete the line

3. Type 'p' to paste the contents of the bufferI recommend using the 'dd' command to delete a line of text and save its contents in a buffer. This is the most straightforward method and requires only one step. To bring back the line you deleted, simply type 'p' to paste the contents of the buffer after the current line.

To know more about achieve visit :

https://brainly.com/question/32107373

#SPJ11

Help pls I don’t exactly remember this L

Help pls I dont exactly remember this L

Answers

Answer:

This is because when the codes are viewed by someone else or the code is getting too big, it gets confusing, hence it is easier if the ID has a meaningful name.

what is one main benefit of the bridge? group of answer choices does not need memory buffers like hubs do. allows us to use ip addresses there is no concept of routing tables limits the size of collision domains

Answers

One main benefit of bridges is that they limit the size of collision domains on a network.

A collision domain is a segment of a network where data packets can collide with each other if they are transmitted at the same time. In a shared media network, such as Ethernet, all devices connected to the same segment share the available bandwidth and compete for access to the network.

When two or more devices transmit data simultaneously, a collision occurs, and the data packets are discarded. This can lead to reduced network performance and increased packet loss.

Bridges help to limit the size of collision domains by selectively forwarding traffic between network segments. By analyzing the destination address of each incoming packet, a bridge can determine whether to forward the packet to the destination segment or to discard it.

By limiting the number of devices that share a single collision domain, bridges help to reduce the likelihood of collisions and improve network performance.

Learn more about bridge here:

https://brainly.com/question/24133891

#SPJ11

a home user reports to a network technician that the internet is slow when they attempt to use their smartphone or laptop with their wi-fi network. the network administrator logs into the admin area of the user's access point and discovers that multiple unknown devices are connected to it. what is most likely the cause of this issue?

Answers

There! The most likely cause of the slow internet for the home user is that multiple unknown devices are connected to their Wi-Fi network, consuming bandwidth and leading to decreased performance.

This issue can be resolved by removing these unknown devices from the network and securing the Wi-Fi with a strong password to prevent unauthorized access in the future.

The most likely cause of the slow internet issue is that the unknown devices connected to the user's access point are consuming a significant portion of the available bandwidth, causing slower speeds for the user's smartphone and laptop. These unknown devices could be other users accessing the network without permission, or it could be malware that has infected the user's access point, allowing unauthorized access.

The network technician would need to identify and remove unknown devices to improve the network performance for the home user.

Learn more about Wi-Fi network here:

https://brainly.com/question/13267388

#SPJ11

A shorthand method consists of a symbol of the element surrounded by dots?.​

Answers

Answer:

Since it is falling freely, the only force on it is its weight, w. w = m ⋅ g = 1000kg ⋅ 9.8m s2 = 9800N To draw a Free Body Diagram, draw an elevator cage (I am sure you would get lots of points for drawing it with intricate detail) with a downward force of 9800 N. I hope this helps,

Explanation:

Employing the use of a(n)
will help you manage a STEM project.

Answers

Answer:

technicians

Explanation:

the answer is technicians. in my freshmen year we made flash cards and i still have them so i remember it.

Answer: technicians

Explanation:

my teacher told me and I passed so its right

Which of the following is a key difference between a For loop and a Do....while loop?

A. A For loop functions at the beginning of the looping structure, while a Do...while loop evaluates the condition at the end.

B. The number of repetitions is known for a For loop but not for a Do... while loop.

C. The number of repetitions is known for a Do...while loop but not for a For loop.

D. A For loop functions as a posttest loop, while a Do....while loop is a pretest loop.

Answers

A While the number of repetitions in a For loop is known, the number of repetitions in a Do while loop is not. Therefore, Option B is the appropriate response.

What accomplishes the for loop?

A piece of code is continually performed by programmers using the for loop, a conditional iterative expression, to check for specified circumstances.

The for loop differs from other looping statements due to the explicit loop number or loop variable that allows the body of the loop to know the precise sequencing of each iteration.

The English term "for" is used to express an object's or action's purpose; in this example, the iteration's goal and specifics are being expressed. Numerous imperative programming languages, including C and C++, use the For loop.

To know more about programming languages, visit:

https://brainly.com/question/18763374

#SPJ1

Give two examples of situations or applications where electrical circuits are used.

Answers

"A battery" or "A generator" are the two applications where electrical circuits are used.

An electrical circuit is generally considered an uninterrupted as well as the closed route of such an electrical current. An electrical circuit comprises electrical equipment, a power supply unit as well as cables linked through a switching node.

There are usually two kinds of the electric circuit, such as:

Series circuitsParallel circuits

Thus the above is the correct answer.

Learn more about Electrical circuit here:

https://brainly.com/question/24509929

Give two examples of situations or applications where electrical circuits are used.

Your network has a network address of 172.17.0.0 with a subnet mask of 255.255.255.0.
Which of the following are true concerning this network? (Select two.)
answer choices
254 IP addresses can be assigned to host devices.
256 IP addresses can be assigned to host devices.
172.17.0.255 is the network broadcast address.

Answers

With a subnet mask of 255.255.255.0, your network's network address is 172.17.0.0. In addition, this network's 172.17.2.0 subnet is genuine, and there are 254 accessible host addresses.

What is subnet?A subnet, which is another name for a subnetwork, is a portion of a larger network that has been divided up. Subnets are the logical partition of an IP network into several smaller network segments, or subnets in more technical words.The protocol used to transport data from one computer to another via the internet is called the Internet Protocol (IP). A logical division of an IP network is called a subnetwork or subnet. Subnetting is the process of splitting an existing network into two or more separate networks. In their IP addresses, computers with the same subnet address use the same most-significant bit-group. A subnet is a subnetwork that belongs to a network and is in the class A, B, or C range. A class B network, for instance, is 172.16.0.0/16. Starting with 172.16, this network is quite large.

To learn more about subnet, refer to:

https://brainly.com/question/29527004

Font-size property changes
O Color
O Alignment
O Font
Size of font

Answers

O font or Size of the font

When derivatively classifying information where can you find a listing of specific information.

Answers

Answer:

You must carry the classification of that existing material forward into your new end product. These two sources are the only authorized sources for derivative classification. Any other source is unauthorized and must not be used as the basis for derivative classification.

what refers to the ability of a company to identify, search, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry?

Answers

The ability of a company to identify, search for, gather, seize, or export digital information in responding to a litigation, audit, investigation, or information inquiry is referred to as "electronic discovery" or "e-discovery."

The ability of a company to identify, search, gather, seize, or export digital information in response to a litigation, audit, investigation, or information inquiry is known as electronic discovery or eDiscovery. With the increasing amount of digital data generated by companies, the process of eDiscovery has become essential in legal and regulatory matters. The eDiscovery process involves the preservation, collection, processing, review, and production of electronic documents and data in a legally defensible manner. This includes not only traditional documents such as emails and spreadsheets but also social media posts, instant messages, and other forms of electronic communication. The process of eDiscovery requires a combination of technical expertise, legal knowledge, and project management skills to ensure that all relevant information is collected and produced in a timely and cost-effective manner.

Learn more about Spreadsheets here:

https://brainly.com/question/8284022

#SPJ11

what is the value of x after the following statements execute? int x; x = (5 <= 3 & 'a' < 'f') ? 3 : 4 group of answer choices 4 2 5 3

Answers

The value of `x` after the following statements execute would be 4.

What is the ternary operator?

A ternary operator is a way of expressing if-then-else statements in a concise, easy-to-read manner. The ternary operator in Java is a replacement for the if-then-else statement.

The ternary operator consists of three parts: the condition, the true or false value, and the expression to evaluate.

The syntax for the ternary operator is as follows:

`variable = (condition) ? expressionTrue : expressionFalse;

`In the given statement, `int x; x = (5 <= 3 & 'a' < 'f') ? 3 : 4`, we have the following:

Condition: `(5 <= 3 & 'a' < 'f')`Expression True: `3`Expression False: `4`

Here, the condition `(5 <= 3 & 'a' < 'f')` evaluates to `false` because `5` is not less than or equal to `3`.

Therefore, the value of `x` would be equal to the expression that comes after the `:` sign, which is `4`. Hence, the value of `x` after the given statements execute would be `4`.

Learn more about ternary operator here:

https://brainly.com/question/30763040

#SPJ11

a cpu is equipped with a cache. accessing a word takes 40 clock cycles if the data is not in the cache and 5 clock cycles if the data is in the cache. what is the effective memory access time in clock cycles if the hit ratio is 80%?

Answers

The effective memory access time in clock cycles can be calculated by considering the hit ratio and the respective access times for cache hit and cache miss. In this scenario, with a hit ratio of 80% and access times of 40 clock cycles for a cache miss and 5 clock cycles for a cache hit, the effective memory access time is calculated as 12 clock cycles.

The effective memory access time can be calculated using the formula:

Effective Memory Access Time = Cache Hit Time + (Cache Miss Time * Miss Rate)

Given that the hit ratio is 80%, the miss rate is 20%. The cache hit time is 5 clock cycles, and the cache miss time is 40 clock cycles. Plugging in these values into the formula, we have:

Effective Memory Access Time = 5 + (40 * 0.20)

= 5 + 8

= 12

Therefore, the effective memory access time in clock cycles is 12.

To learn more about memory access time, refer:

brainly.com/question/31388776

#SPJ11

you are designing a wireless network for a client. your client would like to implement the highest speed possible. which 802.11 standard will work best in this situation? answer 802.11g 802.11b 802.11a 802.11n 802.11ac

Answers

802.11 standard that will work best in this situation is 802.11n. Wi-Fi became much quicker and more dependable with the adoption of the 802.11n standard.

Wi-Fi became much quicker and more dependable with the adoption of the 802.11n standard. It could theoretically transfer data at a speed of 300 Mbps (and could reach up to 450 Mbps when using three antennae).

You should always try to use channel 1, 6, or 11 on a non-MIMO system (802.11 a, b, or g). Stick to channels 1, 6, and 11 while using 802.11n with 20MHz channels; if you want to utilize 40MHz channels, be aware that the airwaves may be crowded, unless you reside in a detached house in a remote location.

Wi-Fi is frequently advertised at "theoretical" rates; according to this standard, 802.11ac can do 1300 Mbps, which is the equivalent of 162.5 MB/s (MBps).

To know more about 802.11n click here:

https://brainly.com/question/27990771

#SPJ4

Applications that are designed to work on one operating system will also work on another operating system as long as they provide the same apis.
a. true
b. false

Answers

Applications that are designed to work on one operating system will also work on another operating system as long as they provide the same APIs. is a false statement.

What  is Application Programming Interface?

API is known to be a term that connote  Application Programming Interface.  The word Application in the above term connote  any kind of software that is known to be made up of a distinct function.

Therefore, Applications that are designed to work on one operating system will also work on another operating system as long as they provide the same APIs. is a false statement.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ1

Print even numbers till 50 in python coding.

Answers

In python, you can use a simple list comprehension to solve this problem.

print([x for x in range(51) if x % 2 == 0])

This code prints all the even numbers from 0 to 50 including 0 and 50.

Sukant's professor asks her to take over his online class while he is away because she is an effective digital communicator.

Which of Sukant's traits show that she understands netiquette? Check all that apply.

a) She listens to others and is friendly in her messages.
b) She posts messages that avoid slang and text language.
c) She is the smartest in the class and overshadows others.
d) She is always studying, so she is slow to respond to messages.
e) She respects the privacy of others and avoids cyberbullying.​

Answers

Answer:

b is the right answer. she posts messages that avoid slang and text language

The answers are a, b, and e.

Providing products or services that could be raffled off by a non-profit organization to raise money is an example of a business _____.

Answers

I think corporation is a correct answer, I found it on internet
Other Questions
The force exerted outward on a plant cell wall by the water contained in the cell is called______pressure. 0.000000006450 in scientific notation A fox is a type of mammal that is related to dogs. How does a fox most likely respond to hot air temperatures in a way that ectothermic animals cannot? by panting, which is in response to an internal stimulus by panting, which is in response to an external stimulus HEEEEELP The height of a street light is 50 feet. It casts a 40foot shadow. At the same time, a man standing next to the street light casts a 5foot shadow. How tall is the man? According to Schopenhauer, how does music influence theartist? Exercise 2 Underline the linking verb (or verbs) in each sentence. Then circle the word or words after the linking verb that identify or describe the subject.Events grew bleaker in Europe as World War II advanced. T/F (a) find inverse of integers 1 to 10 mod 11. tabulate the results. you may find the values by inspection. (b) find inverse of integers 1 to 13 mod 14, if they exist. tabulate the results. Simplify the following the boolean functions, using three-variable K-maps: F(x, y, z) = (0,2,6,7) m OAF=xy+xz+yz OB.F=xy+xz' OC.F=x + y O D.F=z + xy 4 I WILL GIVE OUT 100 POINTS IF ANSWERED CORRECTLY 1) Why do the French want to build forts across the Ohio River Valley?2) Why do Braddock and the British lose at Fort Duquesne?3) Why do the British win at the battle of Quebec? Good flexibility can benefit all of the following excepta. sports performanceb. body compositionc. postureActivityd. muscle soreness prevention There are three classes to design: bird, owl, and swallow. To hold the speed of birds, each class has a protected field airspeedVelocity of type double. This is set via the class constructor. Each class also has a get and set method. Each subclass of bird must implement a function called name that prints the name of the type of bird to the console. bird is an abstract class and owl and swallow are concrete subclasses of bird. i) Write the classes described above in C++. [8 marks] ii) Add functions that print the name of the type of bird to the console. [3 marks] iii) Show how to store an object of owl and swallow in the same std::vector and call the correct name function for each one. [3 marks] INTERPRET THE EVIDENCE1. How does the Why We Fight transcript portray Japan and its leadership? How does it compare Japan to Germany and Italy (Document 23. 1)?2. How would you describe the government's strategy for relocating the Japanese (Document 23. 2? What hardships would Japanese people face? What assistance did the government offer to relocated people?3. Why did Chief Justice Harlan F. Stone uphold the constitutionality of Executive Order 9066 (Document 23. 3)? How does he counter arguments that a curfew for Japanese people constitutes racial discrimination?4. Why did Justice Frank Murphy argue that internment was unconstitutional (Document 23. 4)? Why, in his opinion, did the government specifically target Japanese citizens?5. What did Charles Kikuchi mean by his statement that Americans who protestedhis right to vote were more dangerous than Japanese American citizens (Docu-ment 23. 5)?6. How did opponents of internment invoke American values in their arguments?PUT IT IN CONTEXT1. In what ways was internment different from other instances when the United States suppressed civil liberties during wartime?2. What might have been alternatives to Japanese internment? 3x+2y=4,6x+3y=2 Solve the systems of equations by substitution 6. What breakfast starch is considered a staple in the American south? It is proposed to work with a heating system, through extracting groundwater at 50 Fahrenheit to heat a house up to 70 Fahrenheit. Groundwater drops by 12 degrees Fahrenheit. The house demands 75,000Btu/h.Calculate the minimum flow in lbm/h of water needed to complete this task.Enter only the numerical value Which of the following statements is true of elimination? a. The consistency of feces depends on its mucus content. b. Elimination occurs through the microvilli in the large intestine. c. The gastrointestinal tract and accessory organs carry out the process of elimination. d. Elimination removes metabolic wastes like ammonia and carbon dioxide from the body. Please can someone help me with this question with each element Which two numbers below have a least common multiple of 48? which of the following is true concerning incentive pay? question 10 options: the award is earned only when the predetermined work objective is totally completed. incentive levels are generally subjective in nature. incentive pay awards are granted as one-time payments. it motivates employees to be more productive, but does little to control payroll costs. what type of federal government computing system requires that all individuals accessing the system have a need to know all of the information processed by that system?