Is a free verse a poetry that has no images

Answers

Answer 1
No it just means that it does not have any specific rhymes or formats
Answer 2
No they just typically have no set meter

Related Questions

Brian has created the following selection sort class in Java. In which line is the index of the smallest value returned? In which line is the input array given as an argument?

public class SelectionSort{
private static int positionMin (int] vals, int startPosition) {
int minPosition startPosition;
for (int i startPosition; i
if (vals[i] vals[min Position]) {

minPosition = i;
return min

Position; private static void swap(int] vals, int firstPosition, int secondPosition) {

int temp; temp vals[firstPosition];
vals[firstPosition] vals[second Position];
vals[secondPosition] temp return public static void selSort(int| vals) {
int minPos for (int startPos 0; startPos< vals.length; startPos++){

minPos positionMin(vals,startPos); swap(vals,startPos, min Pos) ;

for (int i 0; i< vals.length; i++) { if(i
}else Jelse { System.out.println(vals[i]); } }; }

return; } }

Answers

Answer:

Explanation:

Since there are no line numbers in this question I will start counting from public class SelectionSort{ as line 1 and so on, as well as provide the code on that line.

The index of the smallest value is returned on line 8 where it says return min which shouldn't have any spaces and should be return minPosition;

The input array is given as an argument at the beginning of the function on line 2 where it says private static int positionMin (int] vals, int startPosition) {, as the variable vals.

This input array is also used as an argument on line 10 where it says Position; private static void swap(int] vals, int firstPosition, int secondPosition) and line 15 where it says vals[secondPosition] temp return public static void selSort(int| vals) {

Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks

Answers

Answer:

Auditing and logging

Explanation:

Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.

To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.

Therefore, in this case, the correct answer is "Auditing and logging."

Which is an example of a technology that has changed the safety of humans?
A) a bicycle

B) a window

C) a rope

D) a baseball bat

Answers

Answer:

B

Explanation:

because they have added more protection from breaking window to keep people safe such as if there were a lot of layers of city

The plugin that changes Jenkins to use green balls instead of blue for successful builds is ________.

Answers

Answer:

The answer is below

Explanation:

Jenkins is a server used by developers to to reliably build, test, and deploy their software. Jenkins has different plugins that can be used for this testing.

Jenkin green ball plugin changes jenkins to use green balls instead of blue for successful builds. This green ball plugin is used as an alternative for blue ball builds and it does not affect the output of the XML and JSON APIs.

The index value of the first element in a JavaScript array is a. undefined b. one c. zero d. null

Answers

Answer:

The index value of the first element in a JavaScript array is zero

Explanation:

Required

Index of first JavaScript array element

Just like numerous programming languages, when an array is declared in JavaScript, the index of the array starts at 0.

Meaning that the first element of the JavaScript array is indexed 0

Say for instance, the array has 5 elements:

This is declared as:

var arrayname = Array(5);

The first of the 5 elements of the array starts at 0 while the last of the 5 elements would be at index 4.

NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER
Which option is typically only used when utilizing self joins?

display name

alias

relationship

primary key

Answers

Answer:

relationship

Explanation:

Answer:

I agree the should be C)relationship

Explanation:

edg 2021

Identify and give the application of the following operators.

(a) / (b) //​

Answers

Answer:

This answer depends on what language you're using, but in most languages, "//" is used to precede a one-line remark. "/" is used to divide a number by the other.  For example:

// this is a remark

var foo = x / y;

There are exceptions to both, although the / is almost universally used for division.  One exception would be assembly of course, I don't know if there are any higher level languages that don't use the slash.

Define a class named person that contains two instance variables of type string that stores the first name and last name of a person and appropriate accessor and mutator methods. Also create a method named displayDetails that outputs the details of a person

Answers

Answer:

Answered below

Explanation:

//Program is written using Java programming language.

Class Person {

private string firstName;

private string lastName;

void set firstName(string a){

firstName = a;

}

string getFirstName(){

return firstName;

}

void setLastname( string b){

lastName = b;

}

string getLastName( ){

return lastName;

}

void displayDetails( ) {

System.out.print(firstName);

System.out.print (lastName);

}

}

//Test program

Class Main{

public static void main(String args [] ){

Person person = new Person( )

person.setFirstName("Karen")

System.out.print(person.getFirstName)

person.displayDetails()

}

}

java Elements in a range Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain fewer than 20 integers. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds). For coding simplicity, follow each output integer by a comma, even the last one. The output ends with a newline. Ex: If the input is: 5 25 51 0 200 33 0 50 then the output is: 25,0,33, (the bounds are 0-50, so 51 and 200 are out of range and thus not output). To achieve the above, first read the list of integers into an array.

Answers

Answer:

The program in Java is:

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

     int n;

     n = input.nextInt();

     int [] mylist = new int[n+1];

     mylist[0] = n;

     System.out.print("List elements: ");

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

     int min,max;

     System.out.print("Min & Max: ");

     min = input.nextInt();

     max = input.nextInt();

     

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

   }

}

Explanation:

This line declares length of list

     int n;

This line gets length of list

     n = input.nextInt();

This line declares the list/array

     int [] mylist = new int[n+1];

This line initializes the element at index 0 to the length of the list

     mylist[0] = n;

This prompts user for elements of the list/array

     System.out.print("List elements: ");

The following iteration gets list elements

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

This declares the lower and upper bound (min, max)

     int min,max;

This line prompts user for elements of the list/array

     System.out.print("Min & Max: ");

This next two lines get the bound of the list/array

     min = input.nextInt();

     max = input.nextInt();

The following iteration prints the elements in the range

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

How many passes will it take to find the four in the list 4,5,6,7,8,9,10

Answers

Answer:

1

Explanation:

Give an example of an occasion when you used logic to solve a problem

Answers

you can use it when like confirming a policy

Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space. Example output for userNum

Answers

userNum = int(input("Enter a number: "))

while userNum > 1:

   print(userNum, end=" ")

   userNum /= 2

I wrote my code in python 3.8. I think this is what you want but I'm not too sure. I'll change the code if you need me to.

If you are the Head of H.R Department in Ali Manufacture Company and you have hire the totally fresh candidates in your company so what kind of training you will suggested; on the job training or off the job training and also justify your answer with four reasons.

Answers

Answer:

on the job training

Explanation:

I would personally suggest on the job training. This is because it provides the new candidates specific experience on how the job will be on a day-to-day basis. This can drastically increase the performance of hired candidates since they will know exactly what and how to perform for that exact company. Also, it will help the candidates get acquainted with the other current employees and even get rid of candidates who would have eventually quit by showing them exactly what the job will be like. Some candidates will realize that the job is not right for them and simply give up and quit.

Fix the infinite loop so that it counts from 3 down to 1.public class Loop1{public static void main(String[] args){int x = 3;while (x > 0){System.out.println(x);}}}

Answers

Answer:

Include x-- right after the print statement

Explanation:

Given:

The above lines of code

Required

Edit to countdown from 3 to 1

The above code (as it is) prints 3 in infinite times. To make it countdown to 1, we simply include a decrement operation.

Initially, the value of x is 3: int x = 3;

And the condition is that the loop is to be repeated as long as x > 0

All we need to do is to include x-- right after the print statement.

This  operation will reduce the value of x on every iteration as long as the condition is true.

Hence, the complete code is:

public class Loop1{

   public static void main(String[] args){

       int x = 3;

       while (x > 0){

           System.out.println(x);

          x--;

       }}}

a term to describe article that can be displayed in their entirety as opposed to abstract and reference only?​

Answers

Answer:

would it be term and tequnique?

Explanation:

oooooooo

he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do

Answers

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software. It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.

According to the video, what are some concerns of Webmasters? Check all that apply.
how fast the website can be accessed
how many writers provide content for a website
how to create images for a website
the number of similar websites that exist
the time it takes for elements on a website to download
website security and privacy

Answers

Answer:

A.how fast the website can be accessed

E.the time it takes for elements on a website to download

F.website security and privacy

Explanation:

Answer:

1,5,6

Explanation:

hope this helps gg

Write a function called quadruple that quadruples a number and returns the result. Then make several calls to the quadruple function to test it out.

For example, if you made a call like

x = quadruple(3)
then x should hold the value 12.

Print the value of x to verify your function works correctly.

(CODEHS, PYTHON)

Answers

def quadruple(n):

   return n*4

print(quadruple(3))

print(quadruple(1))

print(quadruple(2))

I wrote my code in python 3.8. I hope this helps.

/kwɒdˈruː.pəl/ to increase by four times, or to multiply anything by four: In the past ten years, the college's enrolment has increased by a factor of four.

What is the role of quadruple that quadruples a number?

Finding the array's four maximum and four minimum components is another method for locating the quadruple with the highest product. And then supply the maximum of these three product values, which will result in a quadrupled maximum product.

When ordering a quadruple-shot latte, which contains four shots of espresso, you can also use the word quadruple to signify “four times as many.” The suffix quadric-, which means “four,” is the source of the Latin root quadruple, which means “create fourfold.”

Three address codes are also referred to as quadruples. Using pointers to entries in a symbol table as the operands and an enumerated type to represent the operations, quadruples can be accomplished.

Therefore, One operation and up to three operands are divided into four fields in a quadruple.

Learn more about quadruples here:

https://brainly.com/question/7966538

#SPJ2

The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.

a
Conclusion
b
Introduction
c
Counterclaim
d
Topic Sentence
Question 9 (5 points)

Answers

Answer:

D. Topic Sentence

Explanation:

Jackie used the software development life cycle to create a new game. Jackie ran her code to make sure it worked and had no errors.

Which stage of the software development life cycle is Jackie currently in?

Coding
Maintenance
Planning & Analysis
Testing

Answers

Answer:

She is running to maintenance to make sure everything works

Answer:

She is testing it.

Explanation:

PLEASE HELP
A program is designed to determine the minimum value in a list of positive numbers
called numlist. The following program was written
var minimum = MISSING CODE
for(var i = lo; i < numlist.length; i++){
if (numList[1] < minimum)
minimum = numList[1];
console.log("The minimum is" - minimum);
Which of the following can be used to replace ISSING CODE> so that the program works as intended for every possible list of positive numbers?

Answers

The missing code segment is meant to initialize the variable minimum to the first list element.

The missing code is (d) numList[0]

From the question, we understand that the first line of the program should determine the smallest number in the list numList

To do this, we start by initializing the variable minimum to the first element of numList

This is done using the following code segment:

var minimum = numList[0]

Hence, the missing code segment is (d) numList[0]

Read more about similar programs at:

https://brainly.com/question/19484224

Test if a password entered is correct. The secret phrase is Ada Lovelace.

Sample Run 1
Enter the Password: Ada Lovelace
Sample Output 1
Correct!
Sample Run 2
Enter the Password: Blaise Pascal
Sample Output 2
Not Correct

for Python

Answers

password = "Ada Lovelace"

if input("Enter the Password: ") == password:

   print("Correct!")

else:

   print("Not Correct")

I wrote my code in python 3.8. I hope this helps.

What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centimeters?

Answers

Answer:

guys all you have to do is divide and multiply 812x913=741356

and this answer they give you going divide 741356. 1225

so easy guys let me in the comment

Explanation:

Write a function called is_even that takes one parameter and returns a boolean value. It should return True if the argument is even; it should return False otherwise.

The is_even function should not print anything out or return a number. It should only take in a number and return a boolean.

Note: Be sure to include comments for all functions that you use or create.

For example, if you made a call like

is_even_number = is_even(4)
is_even_number should have the value True.

Once you’ve written this function, write a program that asks the user for integers and prints whether the number they entered is even or odd using your is_even function. You should let the user keep entering numbers until they enter the SENTINEL value.

Here is a sample run of the program:

Enter a number: 5
Odd
Enter a number 42
Even
Enter a number: -6
Even
Enter a number: 0
Done!

(CODEHS, PYTHON)

Answers

def is_even_number(n):

   return True if n % 2 == 0 else False

while True:

   number = int(input("Enter a number: "))

   if number == 0:

       break

   else:

       if is_even_number(number):

           print("Even")

       else:

           print("Odd")

I wrote my code in python 3.8. I hope this helps.

Write a program that asks the user how many names they have. (If they have a first name, two middle names, and a last name, for example, they would type 4.) Then, using a for loop, ask the user for each of their names. Finally, print their full name.

Answers

Answer:

The solution is implemented in python:

numnames = int(input("Number of Names: "))

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

names = []

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

Explanation:

This prompts user for number of names

numnames = int(input("Number of Names: "))

This lists the name titles in a list

nametitle = ["Surname: ","Firstname: ","Middlename: ","Middlename 2: "]

This initializes an empty list

names = []

The following for loop get names from the user

for i in range(numnames):

   name = input(nametitle[i])

   names.append(name)

   

The following instructions print the user fullnames

print("Your fullname is: ",end=" ")

for i in names:

   print(i,end=" ")

An example program in Python that asks the user for the number of names they have and then prompts them to enter each name.

It will then print their full name based on the names provided:

python

Copy code

num_names = int(input("How many names do you have? "))

names = []

for i in range(num_names):

   name = input("Enter name {}: ".format(i + 1))

   names.append(name)

full_name = " ".join(names)

print("Your full name is:", full_name)

In this program, we first ask the user to enter the number of names they have. The input is converted to an integer using int() since input() returns a string.

Then, we initialize an empty list names to store the names provided by the user.

Next, we use a for loop that iterates num_names times to ask the user for each name. The loop variable i starts from 0, so we add 1 to it when displaying the prompt using i + 1.

Inside the loop, we prompt the user to enter the name and append it to the names list. After the loop completes, we join all the names in the names list using the join() method with a space as the separator. This creates a single string representing the full name.

Learn more about python on:

https://brainly.com/question/30391554

#SPJ6

According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?

Answers

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

What property can we use to check if a string matches a regular expression?


A. match

B. isEqual

C. isSimilar

D. equal

E. matched


I probably won't be able to see the answer in time but I hope this'll help anyone else

Answers

Answer:

A.Match

Explanation:

Plato

The property that can be used to check if a string matches a regular expression is match. The correct option is A.

What is a regular expression?

Simple characters, like /abc/, or a mixture of simple and special characters, like /ab*c/ or /Chapter (d+).d*/, make up a regular expression pattern. Parentheses, which serve as a storage mechanism, are employed in the final illustration.

A string of characters called a regular expression is used to search for patterns. It is primarily used for string matching, pattern matching with strings, etc. They are a general method of matching patterns to character sequences.

The phrase "regular expression" derives from theories in mathematics and computer science and refers to the regularity of mathematical expressions. The earliest grep tools employed text patterns that were regular expressions in a mathematical sense.

Therefore, the correct option is A. match.

To learn more about regular expression, refer to the link:

https://brainly.com/question/17255278

#SPJ5

During the reconnaissance step of the attack, what open ports were discovered by Zenmap? What services were running on those ports?

Answers

Answer:

Following are the solution to the given question:

Explanation:

It sends commands to its Nmap executable platForm, which is used to specified and retrieves the production. The  ZenMap utilizes templates, which are primarily Nmap.

The parameter templates to decide how scans become formed Several ports, like ports, are available: 11, 21, 22, 25, 53, 445, and 3306, all of which run TCP: Linux services, SMTP Postfix, Apache Tomcat/Coyote JSP.

How many total beats are these tied notes worth, assuming a quarter note equals 1 beat?
A. One
B. Five
C. Three

Answers

Answer:

one i think

Explanation:

What are the top ten famous games in the U.S.

Why? cause I wanna know :D

Answers

Minecraft

Fortnite

Rob.lox

GTA V

Rocket league

League of legends

Mario bros

GTA

Among us

Call Of Duty

Other Questions
Which term is defined as the region in an atom where an electron is most likely to belocated?1.nucleus2.orbital3.quanta4.spectra So one day, this young girl, who was only eleven years old at thetime, started to make speeches and write blogs saying that girls should beallowed to go to school as well.Question: How do you think the people with political power, who wereagainst girls in school, might have reacted when she started doing this? i haven't submitted a single assignment for this class since winter break bc i didn't realize she was assigning things on goformative and not schoology and now we're on trigonometric ratios i'm confused help me Evaluate x + y , for x = 8 and y = -15A. 7B. 23 15 POINTS!C. -7D. -23 4. Which was NOT one of President Woodrow Wilson's Fourteen Points ?A. Creation of an independent PolandB. Lenient treatment of the Central PowersC. Creation of a peace-keeping association of nationsD. Autonomous development for the peoples of Austria-Hungary and the Ottoman Empire (1) Phosphorus silicon is a semi-conductor Only add an answer if you KNOW it's correct!What is the number of the parking spot covered up by the car? Which function is graphed? ! Please answer quickly I GIVEEE BRAINLILSTTT What sentence has correct pronoun-antecedent agreement?Justin forgot to check in and sign their name at the front desk.Most of the art supplies were stored until it was ready to be used.Several of the volunteers brought his or her tools to the building project.Other members of your team may ask you to give them advice. 9)Use VSEPR to predict the electron-pair geometry of N2.A)linearB)trigonal planarC)tetrahedralD)trigonal bipyramidal Slip is made of what two parts? help!What would an author mean if they used the simile, My brand new slippers were as soft as a newborn kittens fur? Which of the following centuries would be part of the Renaissance?The 1000sThe 1200sThe 1500sThe 1800s HELPPPPPP pllllzzz BRAINLIESTTTTTChoose the inequality symbol (>, Select the statements that are true about the graph.The y-intercept of the graph is (0, -8).The vertex is located at (-1,-9)The graph has y-intercepts at (-4.0) and (2.0).The graph has a minimum.The graph has zeros of -4 and 2.The solution of the quadratic function represented by the graph is (-1,-9).The graph has a maximum. Write each fraction as a percent. 2/10, /4, /20 Jada walked 8 miles to school and then a quarter of that distance again. How far did Jada walk? *A. 2 milesB. 10 milesC. 8 milesD. 12 miles PLEASE HELP I WILL GIVE YOU BRAINLIEST(the linked photo)!!! thank you please help thank you