sarah has hired a programmer to create a web page for her business. what type of programming language will the programmer most likely use?

Answers

Answer 1

Computers called servers store shared data, applications, and the network operating system. All network users have access to network resources through servers.

A business that offers both consumers and companies access to the internet is known as an internet service provider (ISP). Additionally, ISPs might offer services like email, domain registration, web hosting, and browsers. The computer is used to process the data; data and a set of instructions are entered into it, and the computer then automatically processes the data in accordance with the instructions. Computers are sometimes referred to as electronic data processing devices. Computers called servers store shared data, applications, and the network operating system. All network users have access to network resources through servers.

Learn more about network here-

https://brainly.com/question/14276789

#SPJ4


Related Questions

on average how many users are active simultaneously? (3 pts.) if each user transmits 10 percent of the time. will the answer in part (d) increase or decrease? why?

Answers

Consider that there are 120 users. Find the likelihood that exactly n users are broadcasting simultaneously at any given time.

How many concurrent users can a circuit switched network support on a single link?

100 Kbps must always be set aside for each user with circuit-switching. Therefore, the link can only handle ten people at once. With packet switching, the likelihood that 10 or more users are active at once is less than.0004 if there are 35 users.

What is the simultaneous equation?

Multiple algebraic equations that have the same unknown variables and the same answer are referred to as simultaneous equations. This suggests that there is a single solution to the simultaneous equations. Several illustrations of simultaneous equations.

To know more about simultaneously visit:-

https://brainly.com/question/28325805

#SPJ4

your team is meeting to prioritize user stories for a coming iteration. each team member has a set of cards with numerical weights associated to them and has been asked to ranked the user stories based on complexity. as each user story is read, each team member flips over their card to indicate their ranking. those that have given the user story a high rating and low rating are given an opportunity to quickly make their point to the team. this process is repeated until a consensus is reached. what tool is described?

Answers

The tool described is Planning Poker. It is a consensus-based technique used by agile development teams to estimate the relative effort or size of development goals in software development. Each team member uses cards with numerical weights, such as the Fibonacci sequence, to indicate their estimation of the complexity of a user story. The team members flip over their cards simultaneously, and any outliers, high or low values, are given an opportunity to explain their reasoning to the team. The process is repeated until a consensus is reached on the complexity of the user story. Planning Poker is often used in Scrum and other agile methodologies to plan and prioritize the work that needs to be done in an upcoming iteration.

the contents of an html file are arranged in a hierarchical structure, starting from the root html element itself and moving down to the text strings contained within individual page elements. true false

Answers

It's true. An HTML file is a document that contains the structure and content of a website.

The structure of an HTML file is arranged in a hierarchical fashion, meaning that there is a parent-child relationship between elements. The root element is the "html" element, which encloses all other elements on the page. From there, elements can be nested within other elements to create the desired structure and organization of the content on the page. For example, a "head" element can contain a "title" element, which in turn contains a text string that displays as the title of the webpage. This hierarchical structure allows for easy identification and manipulation of specific elements within the HTML document.

Learn more about html, here https://brainly.com/question/15093505

#SPJ4

Calculate the following binary sum
and write your answer in binary.
11101 +10011 (Do not add extra O's
at the start of your answer)
Your answer
Calculate the following binary sum
and write your answer in binary.
110111 + 101001 (Do not add extra
O's at the start of your answer)
Your answer
Calculate the following binary sum
and write your answer in binary.
1101011 + 1010110 (Do not add
extra 0's at the start of your answer)
Your answer
* 2 points
*
*
2 points
2 points

these r both 3 separate questions so please help all separate questions

Answers

Answer:

110000,1100000

Explanation:

same method as below questions :)

Which would be the most appropriate type of application to create, analyze and forecast budgets?
A) DBMSB) B) Word processor
C) Spreadsheet
D) Presentation

Answers

The most appropriate type of application to create, analyze and forecast budgets is called Spreadsheet.

The most widely used database structure is 20. A question or a request for specific data contained in a database is referred to as a 21. The electronic equivalent of a file cabinet is a 22. The application for forecast budgets is spreadsheet for all programming languages are standalone applications. Installation is mandatory. C and C++ languages are platform-dependent. For any platform-dependent language, we can develop only standalone applications. We can develop only standalone applications because these languages are platform-dependent languages. The remaining languages are platform-independent languages, so using platform-independent languages we can develop both standalone applications and web applications. C is mainly used for embedded system programming.

To learn more about Spreadsheet click on below link:

https://brainly.com/question/5450012

#SPJ4

the program gets an input value into variable numdogs. write code that outputs the value of variable numdogs. end with a newline. ex: if the input is 2, then the output is: 2 ex: if the input is 5, then the output is:

Answers

Endl is a special object that starts a new output, based on information in the question.  cout;

What do programmes on computers do?

A series of instructions written using a programming languages for a computer to follow is referred to as a computer programme. Software, which also contains manuals and other intangible components, comprises computer programmes as one of its components.

What are software vs. computer programmes?

A collection of instructions used to create a software programme using a programming language is known as a computer programme. A software package of programmes enables hardware to carry out a certain function.

To know more about program visit:

https://brainly.com/question/14618533

#SPJ4

what default values are assigned to your variables in c ? for example: int x; // what value does this have? what values should you use for initialization?

Answers

According to the given statement, Variables defined in C programmes by default have values of 0 (zero).

What is variable ?

In computer programming, a variable is a named container for a certain set of bits or kind of data. A variable is an abstract storage place with an associated symbolic name which stores some known or unknown quantity of information referred to as a value (like integer, float, string etc...). Eventually, a memory address may be used to link or identify a variable. In addition to using the variable name or the variable itself, based on the situation, the stored value is typically referred by variable name. The name may be utilized independently of the clear data thanks to the division of name and content.

To know more about variable visit :

brainly.com/question/17344045

#SPJ4

You are attempting to troubleshoot a computer for a user. When you attempt to turn on the computer by pressing the power button, the computer turns on and the fan spins normally. There is no output displayed on the screen from the PCIe x16 video card. You turn off the computer, remove the processor and the memory, and attempt to power on the computer again. During the boot up sequence, you do not hear any POST beep codes but the fans still spin normally. Which of the following is the MOST likely cause of his issue

Answers

The video editor at Dion Training has reported a problem, claiming that everytime she edits films for an upcoming course, her editing workstation creates a loud clicking noise.

What is output ?

Any data that a computer or other electronic device processes and sends out is referred to as output. Anything that can be seen on your computer's monitor, such as the text you write on the keyboard, is an example of output. A human cannot interact with a computer without some form of output that they can see, feel, or hear. The image's lower half displays information that was transmitted from a computer to a printer. The paper is regarded as an output once the printer has finished producing its physical copy. Any electrical equipment, besides computers, can provide output. A temperature sensor, for instance, might provide information to a water heater.

To know more about output visit:

https://brainly.com/question/27972321

#SPJ4

the size of a laptop screen is measured by the lenght of its diagonal. You want to purchase a laptop with the largest screen possible. Which laptop should you buy

Answers

In 2022, a 17.3-inch laptop will have the biggest screen. Because laptop screens are measured diagonally, every additional inch of screen size gives you a huge amount of more space.

Describe a laptop.

An AC- or battery-powered personal computer called a laptop, often known as a notebook computer by manufacturers, is typically smaller than a briefcase and made to be carried around and utilized in temporary situations including airplanes, libraries, temporary jobs, and meetings. A typical laptop weighs less than 5 pounds and has a thickness of no more than 3 inches.

Typically, laptop displays use thin-screen technology. The thin film transistor or active matrix screen is brighter and has more viewing angles than the STN or dual-scan screen.

To know more about Technology, visit:

https://brainly.com/question/19052834

#SPJ4

Identify which of the following characteristics apply to fission, fusion, or both:

involves the transmutation of elements,
process is used to generate electrical power, -predominate in the interior of the sun,
heavily involves neutrons,
high temperature is required at the initiation of the process,
radiation is emitted during the process

Answers

The characteristics that apply to fission are:

Involves the transmutation of elements.The process is used to generate electrical power.Heavily involves neutrons.High temperature is required at the initiation of the process.Radiation is emitted during the process.

The characteristics that apply to fusion are:

Predominate in the interior of the sun.High temperature is required at the initiation of the process.Radiation is emitted during the process.

Fission and fusion are both processes of nuclear energy production, but they have different mechanisms.

Fission is the splitting of a large nucleus into two or more smaller nuclei, releasing a large amount of energy in the process. Through fission, energy is released from the nucleus of an atom. The process involves splitting the nucleus of a heavy atom, such as uranium or plutonium, into two or more smaller nuclei. In the process, a large amount of energy is released in the form of heat and radiation, which can then be used to generate electrical power.

Fusion, on the other hand, is the process of combining two or more small nuclei into a single larger nucleus, also releasing energy in the process. Unlike fission, fusion is a process that occurs naturally in the core of stars, and is the main source of energy for our sun and other stars. Achieving a sustained reaction of fusion on Earth requires very high temperatures, and is still under development in many research labs around the world.

Learn more about processes of nuclear energy:

https://brainly.com/question/18778311

#SPJ4

Consider the following method, remDups, which is intended to remove duplicate consecutive elements from nums, an ArrayList of integers. For example, if nums contains {1, 2, 2, 3, 4, 3, 5, 5, 6}, then after executing remDups(nums), nums should contain {1, 2, 3, 4, 3, 5, 6}. public static void remDups(ArrayList nums) { for (int j

Answers

Re-sizable arrays, also known as dynamic arrays, are what an arraylist is. It expands in size to make room for additional elements and contracts in size for removal of those elements. The elements are kept in an array by ArrayList internally. It allows you to retrieve the elements by their index, just like arrays.

What are an array and an ArrayList?

The ArrayList is a variable-length Collection class, whereas the array is a data structure with a specified length. Java uses the terms array and ArrayList, which have many differences.

What type of data is an ArrayList?

Lists come in different varieties, and List implements the Collection interface. All operations performed in Collections, such as iterations, can only be done on Objects because the Collection container only accepts Objects data types.

To know more about dynamic arrays visit:-

brainly.com/question/14375939

#SPJ4

A user on your network has been moved to another office down the hall. After the move, she calls you complaining that she has only occasional network access through her wireless connection. Which of the following is most likely the cause of the problem

Answers

Your network has a user who has been relocated to a different office down the hall. She phones you after the action. The distance between the client system and the access point is now too great.

The username and password of a SOHO router should be changed for what reasons?

You can setup and set up access for any of your networked devices if you know the username and password for your access point, which basically gives you administrative access.

What settings on your SOHO router should you alter to prevent unauthorized access to changes?

Alter the system's default usernames and passwords, The default password must be changed to a secret one because an attacker could use this information to "take over" the device.

To know more about network visit :-

https://brainly.com/question/24279473

#SPJ4

ALL. A professor in the Computer, Science departimient'of HackerLand College wants to generate an array: Given ain array of integers of length
n
, arr, and two integer's fand
r
, find another array, brr, such that:
∙:≤
brriji
≤r
- brr[i]
−arr[i]< brr
˙
[i+1]−arr[i+1]
, for every
i
less than - brr[i] brr[it1] for every iless than
n−1
Among all such arrays, return the lexicographically smallest one. If there in not an array that satisfies the conditions, then return an array with the single element
−1.
Example arr
=[1,2,1,2],I=1,r=10
The array
[1,3,3,5]
satisfies given conditions. 1. Each element belongs in the range
[1,10]
. 2. Construct an array crr where,
cr[i]=
brri]
−arr[i]
,
cr=[0,1,2,3]
and it is increasing. 3. The array brr is non-decreasing. brri]-arr[i] for each element is
[0,1,2,3]
1−1=0
Sample Case 1 Sample Input 1 Sample'Output 1
−1
Explanation There is not an array that satisfies the conditions.

Answers

A Python program that generates an array 'brr' based on certain conditions and another array defined as 'arr'. Python is very popular general-purpose, interactive, object-oriented, high-level programming language.

What is a Python program?

A program definition is basically a series of Python statements that are constructed to do something. Even a simple hello.py script is a program. This isn't particularly useful for one-line programs, but strictly speaking Python programs. Python is a dynamically typed, garbage collected programming language created by Guido van Rossum between 1985 and 1990.

Is Python easy to code?

Python is widely known as one of the easiest programming languages ​​for beginners to learn. If you're interested in learning programming languages, I recommend starting with Python. It is also one of the most used.

To learn more about Python visit:

https://brainly.com/question/28691290

#SPJ4

Your child has broken the RJ-45 port of your laptop by sticking clay into it, and there are no wireless networks available in your office building. The manufacturer of your laptop said they could not replace the port for at least a week. Which of the following would be an appropriate workaround to get your laptop back onto the wired network in your office the quickest?

Answers

Purchase and use a USB to RJ-45 adapter.

What network technology is employed to give some network traffic types priority over others?

Any solution that controls data flow to lower packet loss, latency, and jitter on a network is known as a quality of service (QoS).By establishing priorities for particular types of network traffic, QoS regulates and maintains the network's resources.

The most energy-efficient drives are solid state drives?

Since solid state hybrids drives usually spin down more frequently than hard drives, they rank in second place for power efficiency.Storage often doesn't reduce the battery life of a laptop more than 10%.

To know more baout RJ-45 adapter visit:

https://brainly.com/question/30067905

#SPJ4

an interface whose trunk encapsulation is auto can not be configured to trunk mode.

Answers

Answer:

You need to specifically set the encapsulation first, "switch port encapsulation dot1q" then issue your trunk command...

Explanation:

I got some coding hw. Thanks! :)

Answers

Python:

#Libraries

import random

#Creating list

list = [[random.randint(-99,99) for j in range(4)] for i in range(5)]

#Print list

for i in list:

   for j in i:

       print(j,end='\t')

   print()

_____: In an operating system, a feature that allows the OS to preserve the case used for the characters in a file name when creating it, and requires the correct case to open or manage the file.

Answers

If you want to utilize more than one filename parameter, separate them with a space, commas, or semicolon. Wildcard characters can be used to represent two or more characters in a file name.

Which of following commands would you type just at Linux command prompt to promptly shut down Linux?

Using the command line, shut down Linux as follows: Launch the terminal program to shut down the Linux operating system. To shut off the computer, type "sudo shutdown -n now." After some time has passed, the Windows server will shut down.

What DOS Mcq instruction is used to give a disk a name?

Solution Option C: Label is a command that comes with several operating systems in computing, including DOS, OS/2, and Microsoft Windows. A volume label on such a logo appeared, such as an hard disk partitioning or perhaps a floppy disk, can be added, changed, or removed using this method.

To know more about operating system visit:

https://brainly.com/question/6689423

#SPJ4

there are 65 apple trees in an orchard. each tree produces 805 apples. for each additional tree planted in the orchard, the output per tree drops by 7 apples. how many trees should be added to the existing orchard to maximize the total output of trees

Answers

The total output of apples can be maximized by adding a total of 9 trees to the existing orchard.

What is existing orchard?

Existing orchard is an agricultural term used to describe an area of land where fruit trees have already been planted. This can be a commercial orchard, where the trees are managed and harvested for their fruit, or a residential orchard, which is typically a backyard or garden where fruit trees are planted for personal consumption and enjoyment. Orchards are often planted in rows, with trees spaced close together in order to maximize production and efficiency.

This is because the additional trees will produce 7 fewer apples each, adding up to 63 apples in total. The total output of apples will then be 805 x (65+9) = 54,785 apples. This is the maximum output that can be achieved with the existing orchard.

To learn more about existing orchard
https://brainly.com/question/15376920
#SPJ4

true or false: warning banners do not have a control on the sans score checklist. select one: true false

Answers

This claim is untrue because the objective of any photojournalism was to take a good shot that would serve as an effective illustration for an article.

It usually most effectively relates to photos, although it can also refer to video utilized in news broadcasts. The way photojournalism differs from other closely related branches of photography (such as documentary photography, social documentary photography, war photography, street photography, and celeb photography) is through the adoption of a rigid moral code that calls for an honest but independent approach that tells a story in purely journalistic terms. They should be knowledgeable and skillful, and able to provide material in a unique style that is both educational and entertaining. A photojournalist is a form of reporter, much like any other writer, but they frequently have to make quick decisions and carry photography equipment while exposed to several challenges, including immediate physical danger.

Learn more about Photojournalism here:

https://brainly.com/question/29692549

#SPJ4

You have just installed a wireless router on your home network. Which of the following should you do to make it highly secure

Answers

Answer: Change the administrator name and password and also change the SSID( wi-fi network name)

Explanation:

It helps strengthen the security of the device.

what should you do when you are finished working a database? a. close the navigation pane. b. open and then save each object in the database. c. close the database. d. sign out so other people can use the database.

Answers

Each record in the database should be opened, then saved. To prevent losing the newly created table, you must back up your complete database after creating a table.

What needs to be done in order to rename a table with in navigation pane?

To rename a table, simply right-click it in the Side Menu and choose Rename from the shortcut menu. To rename the table, you must first close all outstanding objects that reference it. Press ENTER after entering the new name. Mostly on Quick Access Toolbar, click Save to save your changes.

What activities take place on a database?

The ability to store, edit, manage, and retrieve vast amounts of particular information, such as business-critical data, pay stubs, call records, client information, employee records, and sales data, is an example of database operations in the business world.

To know more about database visit:

https://brainly.com/question/6447559

#SPJ4

How to Secure a Home WiFi Network for Remote Work

Answers

Answer:

Follow steps

Explanation:

1.How to Secure a Home WiFi Network for Remote Work

2.Own your router and modem instead of renting. ...

3.Keep your router up to date. ...

4.Ensure your router admin credentials are secure. ...

5.Ensure your WiFi network password is strong, and you're using WPA2 security. ...

6.Remove unnecessary connected devices.

which of the following is not true about public wi-fi hot spot safety? a. always keep your wireless connection on. b. avoid accessing financial information. c. sign out of websites. d. do not leave your computer unattended.

Answers

A narrative element prevented the show from finishing in half the time that it could have. I apologize, "A Good Spot!" In any case, the couple had a set number of moves and could choose to stop at any time, keeping any prizes they had already collected.

What should you AVOID doing to secure a wireless network?

Keep the router password and default network name. What kind of broadband internet does adding more users cause the connection to degrade?

Is Wi-Fi more secure than a Hot Spot?

Because it uses your cell phone number to authenticate, a mobile hotspot is a secure network. As opposed to using free public Wi-Fi, a mobile hotspot is safer and more secure because of this.

To know more about Wi-Fi visit:-

brainly.com/question/13267388

#SPJ4

Describe the advantages and disadvantages of using cloud software compared to stand-alone software.

Answers

Answer:

Advantages and disadvantages are:-

Explanation:

Advantage – Cost Reduction

It’s a basic financial principle that profit comes from making more money than you spend. Do you know what doesn’t come cheap? Just about everything related to computers. So when it comes to cloud computing advantages and disadvantages, this is at the top of the whole list for most businesses.

Disadvantage – Downtime

Downtime is perhaps the single greatest disadvantage of cloud computing. We’re not talking about server downtime, but your Internet access going down.

As long as your Internet access is out, you can’t do anything with the cloud.

Robust mobile data plans can help to offset that problem temporarily. Cellular service often remains viable when internet access and even power goes out. Of course, data plans are capped and mobile devices have limited battery life.

In a certain game, the integer variable bonus is assigned a value based on the value of the integer variable score. If score is greater than 100, bonus is assigned a value that is 10 times score. • If score is between 50 and 100 inclusive, bonus is assigned the value of score • If score is less than 50, bonus is assigned a value of Which of the following code segments assigns bonus correctly for all possible integer values of score? Select two answers IF(score > 100) { bonus score * 10 3 ELSE { IF(score 2 50) { bonus score 3 ELSE { bonus + } A 3 10 B IF(score 250) { IF(score > 100) { bonus score ) ELSE { bonus + } 3 ELSE { bonus score } С IF(score < 50) { bonus to } ELSE { IF(score 250) { bonus score } ELSE { bonus + score } } 10 D IF(score < 50) { bonus +0 } ELSE { IF(score > 100) { bonus score } ELSE { bonus score 3 } * 10

Answers

If-else tests a group of pairs of if, then expressions and returns the value of the then argument for the first true-evaluated if argument. The remaining list parameters are not assessed. The value of the otherwise argument is returned if none of the if arguments evaluate to true.

The R if-else statement has an alternate and condensed form called the "ifelse()" function. Additionally, the employment of the "vectorized" technology speeds up the process. Instead of accepting individual values as arguments repeatedly, the vector values are all accepted as an argument at once. If a given condition is true, use the if statement to describe a block of code that should be executed. If the same condition is false, use else to describe a block of code that should be executed. If the initial condition is incorrect, use the else if clause to give a new condition to test. To specify a variety of alternative code blocks to run, use switch.

IF(score > 100)

{

bonus ←← score * 10

}

ELSE

{

IF(score ≥ 50)

{

bonus ←← score

}

ELSE

{

bonus ←← 0

}

}

IF(score < 50)

{

bonus ←← 0

}

ELSE

{

IF(score > 100)

{

bonus ←← score * 10

}

ELSE

{

bonus ←← score

}

}

Learn more about If-else here

https://brainly.com/question/28430850

#SPJ4

whenever a website visitor views any page on your site, they trigger the page view event. what if you wanted to define a new event to trigger when vis

Answers

Initialization - All website  Pages triggers are by default present in every web container. Any tags that need to fire before other triggers can be selected by this trigger. Page View: Launches as soon as a page starts loading in a web browser.

To identify and track visitors, what do websites attribute to visitors?

All devices connected to the Internet have an IP address, and the majority of them have what is known as a reverse DNS record. In order to identify the businesses accessing your website based on their IP address, website visitor tracking tools like Lead feeder use reverse DNS.

What events are taken into account in the real-time report?

Explanation: The Realtime Overview displays the top 10 pages where users are most active together with the number of users and the source of each page's users.

To know more about website  visit:-

https://brainly.com/question/29875446

#SPJ4

a network administrator is installing a device that uses redundant array of independent disks (raid) technologies for redundancy and provides employees remote access so that files can be accessed anywhere. the device does not require licensing and stores data at the file level. which device is the employee likely installing in the infrastructure?

Answers

The system is unlicensed and stores data at the file level. The employee is most likely installing the NAS device in the infrastructure.

Data can be saved and kept in three different ways: in files, blocks, and objects. Digital information storage facilitates data tracking. You can locate certain records using the document management system's built-in search functions. These systems also allow you to sort data, which makes it simpler to find information. With a few clicks, you can access the information you need. Using HDD, SSD, and USB digital drives for data storage for external hard disks, you can use any of these methods, but I strongly advise choosing one of them. A solid-state drive (SSD) for an external backup is an excellent option if you plan to store the data for a long period.

Learn more about Data here:

https://brainly.com/question/29488896

#SPJ4

the marketing department uses large name and address databases for catalog and other promotions. some of the databases are ones they own and others are purchased from other catalog sales companies and from internet companies. the databases are currently on a windows server 2012 (without release 2), standard edition server, which is overloaded. when they perform sorts and queries of addresses, the computer operates extremely slowly. which windows server 2016 edition do you recommend for them? provide a justification for your recommendation

Answers

The justification for the Windows server 2016 edition is in this case any Windows server 2016 editions are compatible with the firm. It depends upon the requirement of system hardware and software needs.

What is Windows Server 2016?

Windows Server 2016 is an operating system that is used to serve as a platform for running networked applications.

The data center edition does not include database software, but it does have an operating system capable of handling massive database applications in an enterprise. It quickly manipulates complex data.

Therefore, the Internet protocol is used by default on the network to ensure data delivery to the destination site.

To learn more about Windows Server 2016, refer to the link:

https://brainly.com/question/14587803

#SPJ1

true or false, an algorithm is a sequence of steps executed by a computer that takes data inputs and determines outputs.

Answers

It is true that an algorithm is a set of instructions that a computer uses to determine results from inputs of data.

A step-by-step procedure or an algorithm?

A step-by-step process called an algorithm specifies a series of directives that must be followed in a particular sequence in order to yield the intended outcome. The fact that algorithms are typically designed independently of the underlying languages means that an algorithm can be implemented in multiple computer languages.

In regards to algorithms, which of the following is false?

Almost every algorithm is a program. The claim is untrue, as explained. A program is the name for an algorithm that is represented by a programming language. The opposite is not true; any program is an algorithm.

To know more about algorithm visit :-

https://brainly.com/question/22984934

#SPJ4

What is the output of the following code? no W = 0 x = 5 y = 1 z = 4 + 1 - 1 if x > y: if y > z: W = W else: W = W if y < z: w = w * 2 else: W = W + 5 print (w)

Answers

The results of the following code are as follows: -2 if no W = 0 x = 5 y = 1 z = 4 + 1 - 1 if x > y: if y > z: W = W else: W = W else: W = W + 5 print if y z: w = w * 2 (w).

What the software gets is input (from user, from evaluations, files, SQL, ETC) with code.

What the application informs you (or "returns") is considered output!

Due to semantics alone, some find situations like the one you provided puzzling.

Integer a=3; Integer b=2; Integer b is given the input of 2; Integer b=a++; Integer b is given the value of a; THEN a receives +1; Integer b gets +1; THEN is provided as OUTPUT to the console. I'm just assuming, but I'd say the output is 4?

Learning C++ makes it quite simple to distinguish between input and output: input is any assignment ("="), request for information ("cin >>"), etc.

The "outcome," so to speak, is output.

Learn more about Code here:

https://brainly.com/question/17293834

#SPJ4

Other Questions
Jenny drew a figure in art class. Does it have rotational symmetry? If yes, what is the angle of rotation. What is the Celsius temperature of 100.0 g of chlorine gas in a 35.0 L container at 800 mmHg?a. 159 Cb. 46 Cc. 318 Cd. -114 C n 150 words, write a paragraph in which you use a pathos-based argument to explain why a city-wide curfew for teenagers should or should not be instituted in your town. For improved security the Approved Domains section of the LTI Pro configuration page needs to be configured what was the outcome of the treaty in which the english agreed not to settle west of the blue ridge mountains? teen detectives why does summer think they're going to end up in a hospital? the bus is driving really fast. the roosters are attacking them. summer isn't feeling well. the bus is heading towards a wall. Mantra Write a complete Java program with class name Mantra that produces the exercise's output. For now, put all of your code into the program's main method. There's one thing every coder must understand: The System.out.println command. There's one thing every coder must understand: The System.out.println command. In the Agile Manifesto Principles 3 and 7 recommend continuous software delivery in "weeks" as a measure of progress. What's one of the ways an agile team can follow this principle? What was one result of Mao Zedong's Cultural Revolution? A wave with a frequency of 6 kHz was found to oscillate 24,000 times. Over what time period was it measured? a security infraction involves loss compromise or suspected compromise which graph represents the function y=-2cos(2x) A department store buys 100 shirts at a cost of $1,200 and sells them at a selling price of $29 each. Find the percent markup how does the de broglie wavelength of an electron change if its momentum increases?a. The de Broglie wavelength of the electron increases.b. The de Broglie wavelength of the electron decreases.c. The de Broglie wavelength of the electron is unchanged. . 19) jabari is playing on the carpet with trains. Dana snatches the train out of his hand, and he clenches his fist and screams. How could you support jabari through hus anger? A) Approach calmly and acknowledge Jabar's feelings by sayingJabariI heard your scream, you sound angry O B. Stand back and let natural consequences take over, even if it's something physical like hitting . C)Tell Jabari and Dana to work it out. OD. Express your disappointment in Dana , and write a note to let her parents know about the negative interaction It took 1649 years for the world population to double, going from 0.25 billion people to 0.5 billion people. Looking at your graph, how many years did it take for the population to double once again A graphic artist uses a program to draw geometric shapes in a given pattern. The program uses an algorithm that draws the shapes based on input from the artist. The table shows the approximate number of steps the algorithm takes to draw different numbers of shapes.Based on the values in the table, which of the following best characterizes the algorithm for drawing nshapes, where nis a very large number?answer choicesThe algorithm runs in a reasonable amount of time because it will use approximately nsteps to draw nshapes.The algorithm runs in a reasonable amount of time because it will use approximately N 2 steps to draw n shapes.The algorithm runs in an unreasonable amount of time because it will use approximately n steps to draw n shapes.The algorithm runs in an unreasonable amount of time because it will use approximately N 2 steps to draw n shapes. georgia's budget for july was $100,000 in sales; she incurred total costs of 89%. how much profit did she make? Womens style of communication has often involved ____________. a. telling others what to do b. thinking only about themselves c. understanding others emotions d. trying not to get involved with others according to traditional behaviorists, all voluntary actions are determined by: group of answer choices operant conditioning. classical conditioning. social learning theory. attachment theory.