Lucy is in charge of creating a user interface for a new app. During what phase of the project should she expect to complete her work?

A.
alongside the development of the app

B.
after the app has been developed

C.
during the testing phase

D.
during the design phase

Answers

Answer 1

Answer:

C option

Explanation:

Because in testing phase the game has been developed and test for errors in game.


Related Questions

codes 7.2.8: Listed Greeting python
pls help i have no idea on how to fix this

Answers

The listed greetings program is an illustration of Python functions.

The error in the program is that the program is not properly indented.

Python program uses indents to identify blocks of code.

So, the fix to the program is to properly indent the code, and the fix (without the comments) is as follows:

def greetings(s):

   x = s.split()

   print("Hello, "+x[0]+"! I also enjoy "+x[1]+"!")

Read more about Python programs at:

https://brainly.com/question/16240699

Wikis are designed for ________, which is allowing people to contribute more than just posting a response

Answers

Answer:

collabirations

Explanation

Wikis are designed for collabirations, which is allowing people to contribute more than just posting a response.

Write a program that reads and unspecified number of integers, determines how many positive and negative values have been read, and computes the total and average of the input values (not counting zeroes). The program ends when the user enters 0. The average must be displayed as a floating point. All other values must be displayed as an integer. (For Python)

Answers

Answer:

The program was wrote in the version 3.9.5 of python and it's in the homework.txt file.

Which of the following is true regarding computer science careers?
A. There are a limited number of jobs in this field.
B. There are not different job types in this field.
C. The number will increase over the next several years.
D. You must be a programmer to work in this field.
(WILL MARK BRANLIEST IF CORRECT)

Answers

Answer: There are several different job types in this field.

Explanation: did the test and got it right

Answer:

A or C!

Explanation:

Im pretty sure its one of those answers. I think its C though! If I'm wrong, please tell me! I just did the test and I forgot if I got it right or not. It wont let me go back in-

- A FLVS student with a 99.91 percent in computer science (Totally not bragging!)

URGENT!! thank you!!!!!

Answers

Answer:

Robots or automatons

Explanation:

Machines that can perform tasks historically performed by humans can improve productivity (they can work non-stop) and of course the environment is safer for workers (work is done by a machine instead) but there is job loss (people who used to do the machine's work are redundant).

9. Which of the following is a disadvantage of cloud storage? * Accessibility (offline/without internet) Reduction of storage cost to organization, Increased possibility for disaster recovery, Efficient management of stored Data​

Answers

Answer:

Accessibility offline

Explanation:

What are the steps for adding a Watch Window?
Select the cell to watch

Answers

Answer:

How to The Watch Window in Excel

Select the cell you want to watch.

Click the Formulas tab.

Click the Watch Window button. ...

Click the Add Watch. ...

Ensure the correct cell is identified and click Add.

Scroll to the area of the worksheet where you need to add or update values.

Update the cell values.

While on vacation, Joe receives a phone call from his identity alert service notifying him that two of his accounts have been accessed in the past hour. Earlier in the day, he did connect a laptop to a wireless hotspot at McDonald's and accessed the two accounts in question.
Which of the following is the most likely attack used against Joe?
A. Unauthorized association
B. Honeyspot access point
C. Rogue access point
D. Jamming signal

Answers

The most likely form of cyber attack that was used against Joe during his vacation is: B. Honeyspot access point.

A honeyspot access-point refers to a network system that appears to be legitimate but fraudulent because it is usually set up to capture wireless transmissions, especially by eavesdropping on the sensitive information that are being transmitted by cyber attackers and hackers.

This ultimately implies that, it is usually set up as decoy to lure unsuspecting cyber attackers and hackers, in order to detect, deflect and study their attempt to gain unauthorized access to the network.

In this scenario, a honeyspot access-point was used against Joe during his vacation because he connected to a wireless hotspot at McDonald's.

Read more: https://brainly.com/question/5660386

Which of these problems is correct if the numbers are binary numbers?
Group of answer choices

1 + 1 = 2

1 + 1 = 10

0 + 0 = 1

1 + 0 = 10

Answers

Answer:

1 + 1 = 10

Explanation:

2 does not occur in the binary "alphabet"

0 + 0 = 0 in any base, so also in binary

1 + 0 = 1 in any base, so also in binary

The answer is 1 + 1 = 10
1 = 1 in binary numbers, so 1 + 1 = 2 but 2 in binary numbers is 10, 2 doesn’t exist in binary numbers, it is only 1s and 0s so therefore it would be 10.

write an algorithm to print circumference of a circle​

Answers

Answer:

1 Start

2 Read the value of radius r of Circle

3. Give Pi = 3.14

4 Calculate area of Circle = Pi x r x r

5. Calculate Circumference of circle

( You can use either C= 2 X Pi X r Or Area (A) = Pi X r X r Circumference (C) = 2 X Pi X r A/r = Pi X r A/r = C/2 So C = 2 x ( A/r ) 5. Print area and Circumference

6. End.

A company is looking for an employee to install new computers and integrate them into its existing network. Which computer field most likely include this job ?
A. Network systems administrator
B. Information security analysis
C. Computer support
D. Application Development

Answers

A. Network systems administrator

Answer:

A. Network systems administrator

Explanation:

trust me i just did it 1.3.2

8.3.7: Exclamat!on Po!nts
Write the function exclamation that takes a string and then returns the same string with every lowercase i replaced with an exclamation point. Your function should:

Convert the initial string to a list
Use a for loop to go through your list element by element
Whenever you see a lowercase i, replace it with an exclamation point in the list
Return the stringified version of the list when your for loop is finished
Here’s what an example run of your program might look like:

exclamation("I like music.")
# => I l!ke mus!c.

Answers

The function is an illustration of loops.

Loop instructions are used to repeat operations

The function in Python, where comments are used to explain each line is as follows:

#This defines the function

def exclamation(myStr):

   #This iterates through the string

   for i in range(len(myStr)):

       #This checks if the current character of the string is "i"

       if myStr[i] == "i":

           #If yes, this converts the string to a list

           s = list(myStr)

           #This replaces i with !

           s[i] = '!'

           #This gets the updated string

           myStr = "".join(s)

   #This returns the new string

   return myStr

       

Read more about similar programs at:

https://brainly.com/question/22444309

Which of these would make text on a slide difficult to read?
Ohigh contrast between text and background
Olow contrast between text and background
O a sans serif font
O a large font when the presentation is in a large room

Answers

Low contrast between your text and the background

How do I type fast?

Give me an actual answer...

Answers

Practice!
And a good keyboard I recommend mechanical key boards
But the best way to improving your WPM is definitely practice one way you can practice is playing typeracer it’s pretty fun way

Hope this helps!
Brainliest is much appreciated!

Answer:

Use all 10 fingers and remember where the keys are.

Explanation:

This may take a while to get used to, but just let your hands flow across the keyboard. There really isn't a specific way to do it, but there are websites that'll help you.

to find detailed information about the origin of an email message, look at the ________________.

Answers

Email header. The email header is a code snippet in an HTML email, that contains information about the sender, recipient, email's route to get to the inbox and various authentication details

In a computer-controlled greenhouse, a temperature sensor and a window motor are connected to the computer.
If the temperature rises above 23°, the windows are opened.
Draw a flowchart to describe this system.

Answers

Hope this helps solve it

Which of the following is a responsibility of CTSO membership?

getting all As in your classes

traveling to a national conference

conducting yourself appropriately and professionally

getting a job in your career field after graduation

Answers

Answer:conducting yourself appropriately and professionally

Explanation:

2021 edg

A multinational pharmaceutical company used a saffron trident in a promotional campaign for one of its drugs in India. The saffron trident, a religious symbol in India, was meant to indicate the three levels of efficacy of the drug but mistakenly conveyed a religious message to Indians. This miscommunication indicates a problem associated with which step of the international communications process?
i. information source selection
ii. media channel selection
iii. encoding
iv. noise cancellation
v. message transmission

Answers

Answer : Encoding

Explanation : Encoding refers to correctly coding the message so that the receiver gets the clear message without feating any misunderstanding.

Based on the given information, This miscommunication indicates a problem associated with the encoding step of the international communications process. Thus the correct option is 3.

What is communication?

Communication is referred to the exchange of information between two individuals in the form of conversation, opinion, suggestion, or advice with the help of medium or direct interaction.

In the given case, it is explained that during a marketing campaign for one of its medications in India, a multinational pharmaceutical company utilized a saffron trident to represent the drug's three degrees of efficacy.

The method used to transform thoughts into communication is called encoding. The communicator must start decoding in order to communicate meaning in the form of symbols that stand in for concepts or thoughts.

Therefore, option 3 is appropriate.

Learn more about Communication, here:

https://brainly.com/question/22558440

#SPJ6

A ____ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.

Answers

Answer:

button

Explanation:

What does it mean by does the author create an emotional connection toward the readers?

(Emotional connection reading definition)

Answers

Answer:

the author makes an emotional connection between you and the character

Explanation:

short version:you feel the characters emotion

If your company uses a non-price competition strategy what should you focus on
A. lowering prices
B. differentiation
C. creating direct competitors
D. the public sector

Answers

B- differentiation

nonprice competition strategy refers to strategy to win a business competition that does not involved lowering price of the product.

Businesses mostly do this using differentiation strategy, which is increasing the different variety of product that they sell in the market.

What is data communication.. ​

Answers

What is data communication?

The exchange of data between source and a receiver by way of transmission media such as a wire cable

Hope this helps you!!

You see a whiteboard that has “8-10 years olds, interested in horses” written on it. This is MOST likely a description of:

A.
data management.

B.
target users.

C.
GUI.

D.
iterative development.

Answers

Answer:

B target users

Explanation:

because it targets 8-10 year olds that are interested in horses so it targets that audience range

mightier than the waves of the sea is his love for you

Answers

cool but kinda creepy ngl

Pls help me plsssss

Answers

Answer: drawright(30)

Explanation:

linnea is researching a type of storage that uses a single storage device to serve files over a network and is relatively inexpensive. what type of storage is linnea researching?

Answers

Considering the situation described above, the type of storage Linnea is researching is "NAS."

What is NAS in storage?

NAS is an acronym for Network Attached Storage. It is used as a file-level computer data storage server attached to a computer network.

NAS is usually applied in serving the files over Ethernet. It is cheaper and can be set up quickly.

Different Components of NAS.

Components of Network Attached Storage include the following:

CPUNetwork Interface CardsOperating SystemNFS and CIFS protocol, etc.

Hence, in this case, it is concluded that the correct answer is NAS

Learn more about NAS here: https://brainly.com/question/25705115

A _____ is a question about the data structured in a way that the DBMS can recognize and process. a. query b. relationship c. tuple d. product

Answers

Answer:

a

Explanation:

A query is a question about the data structured in a way that the DBMS can recognize and process.

What is relationship in DBMS?

A relationship, in the scope of databases, is known to be a kind of scenario where  two relational database tables and one table is known to have a foreign key that is said to references the primary key.

Note that A query is a question about the data structured in a way that the DBMS can recognize and process.

Learn more about query  from

https://brainly.com/question/2569440

#SPJ2

What is the full form of MOS

Answers

Answer:

Military occupational speciality

On the following page, write a static method print Short Words that accepts two parameters:_____.
a. a String str containing a list of words (separated by spaces), and an integer maxLength .
b. This method should print out the words in str whose lengths are at most maxLength.
c. You can assume there will always be a space after the last word in the string.

Answers

Methods in Java are collections of program statements that are named, and executed when called/invoked

The printShortWords method in Java where comments are used to explain each line is as follows:

//This defines the static method

public static void printShortWords(String str, int maxLength){

    //This iterates through each word in the string

    for(String word: str.split(" ")){

        //The compares the length of each word to maxLength

        if(word.length()<=maxLength){

            //If the length of the current word is atleast maxLength, the word is printed

        System.out.print(word+" ");

        }

    }

}

Read more about static methods at:

https://brainly.com/question/19360941

One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.

Answers

One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.

Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.

Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.

So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.

Learn more about structured programs here:

https://brainly.com/question/25770844

Other Questions
A GFR of 95 ml/minute indicates 1. How do technology use science knowledge? I need help to find the value of x. Round to the nearest tenth The following data represent the chemistry grades for a random sample of 12 freshmen at a certain college along with their scores on an intelligence test administered while they were still seniors in high school. Test Chemistry Student Score, x Grade, y 1 2 3 4 5 6 7 8 9 10 11 12 65 50 55 65 55 70 65 70 55 70 50 55 85 74 76 90 85 87 94 98 81 91 76 74 Compute and interpret the sample correlation coefficient. Ton cu ha c nh hng g n th gii What bug is this please help I found it on the ground and want to make it my pet I need answers ASAP what bug is this please in isosceles triangle XYZ, angle X=117. calculate angleZ Given that the supply and demand function for the product type is Qd = [tex]\sqrt{260-p}[/tex],Qs = [tex]\sqrt{p-14}[/tex]. consumer surplus ??. Partes del sistema linfatico What was the most significant use of German submarines during world war 1? 3. Ngy 01/01/N, Cng ty F nhn c mt thng phiu do cng ty A pht hnh vi mnh gi X (Sinh vin t cho s liu ca X > 100.000$), li sut 11%, thi hn 5 nm, li c tr nh k vo cui nm. Li sut th trng cho thng phiu tng t l 15%/nm. (2,5 im)Yu cu1. Anh (ch) hy xc nh gi tr hin ti (gi pht hnh) ca thng phiu? Chit khu (Ph tri) thng phiu? nh khon ghi nhn thng phiu phi thu ti ngy pht hnh i vi cng ty F v nh khon ghi nhn thng phiu phi tr ti ngy pht hnh i vi cng ty A? Cho nhn xt ca anh ch.2. Lp bng phn b gi tr chit khu (ph tri) thng phiu theo phng php li thc? nh khon ghi nhn doanh thu li cui nm u tin i vi cng ty F; chi ph li cui nm u tin i vi cng ty A.3. Thc hin yu cu 1 v yu cu 2 nu li sut th trng cho thng phiu tng t l 9%/nm.Bit rng TABLE 6-4 PRESENT VALUE OF AN ORDINARY ANNUITY OF 1: Bng 6-4: Bng tra tnh ton gi tr hin ti ca li thng phiuTABLE 6-2 PRESENT VALUE OF 1: Bng 6-2: Bng tra tnh ton gi tr hin ti ca gc thng phiu Difference between uniform motion and non uniform motion What is the surface area of this figure in square centimeters?A.96B.75C.84D.60 6. The following is a list of New Deal legislation. Social Security Administration (SSA) Works Progress Administration (WPA) Federal Housing Administration (FHA) National YouthAdministration (NYA) Tennessee Valley Authority (TVA)Which statement best explains a reason for the establishment of these programs?A. The state governments were required to provide grants for education.B. The federal government assumedthe oversight of local regulations.C. The state governments were required to provide loans to unskilled workers.D. The federal government accepted the responsibility of providing economic relief.Mi A source must be cited Suppose that hiring a third worker at the campus coffee shop increases sales from $115 per hour to $130 per hour. What is the marginal product of labor per hour from adding that third worker Select the correct answer from each drop-down menu.CD is perpendicular to AB and passes through point 95, 12).If the coordinates of A and B are (-10, -3) and (7,14), respectively, the x-intercept of C is (blank). The point(Blank) lies on CD. Russell Company has acquired a building with a loan that requires payments of $22,500 every six months for 4 years. The annual interest rate on the loan is 10%. What is the present value of the building? (PV of $1, FV of $1, PVA of $1, and FVA of $1) (Use appropriate factor(s) from the tables provided.) Bond length is the distance between the centers of two bonded atoms. On the potential energy curve, the bond length is the internuclear distance between the two atoms when the potential energy of the system reaches its lowest value. Given that the atomic radii of H and Br are 37.0 pm and 115 pm , respectively, predict the upper limit of the bond length of the HBr molecule. Express your answer to three significant figures and include the appropriate units. View Available Hint(s)for Part C Goldfarb Company manufactures and sells toasters. Each toaster sells for $22.95 and the variable cost per unit is $15.85. Goldfarb's total fixed costs are $24,200, and budgeted sales are 7,200 units. What is the contribution margin per unit