.....................................................

.....................................................

Answers

Answer 1

Answer:

i think its, a. sequence

Explanation:

i could be wrong, if i am, i am sorry


Related Questions


Explain three of the the features of the word processing to document. ​

Answers

Word processing software may be used to create, edit, save, and print documents, among other things. Text within a document may be copied, pasted, moved, and deleted. Text formatting includes font selection, bolding, underlining, and italicizing.

I’m so sorry to say I have a lot to say I don’t

A message in your code that explains what is going on in your program (Known by seeing // before the message)

Answers

Answer:

comment

Explanation:

Comments just comment on the code.

Comments could be helpful when someone else has to read your code.

Comments just comment on the code. Comments could be helpful when someone else has to read your code.

What is Comments?

An explanation or annotation in a computer program's source code that can be viewed by programmers is known as a remark.

Compilers and interpreters typically ignore them because they were introduced to make the source code simpler for humans to understand. The syntax of comments differs significantly among programming languages.

Sometimes, comments are also handled in a variety of ways by documentation generators to provide documentation separate from the source code itself, or they are used to integrate with source code management systems and other types of external programming tools.

Therefore, Comments just comment on the code. Comments could be helpful when someone else has to read your code.

To learn more about comments, refer to the link:

https://brainly.com/question/30318947

#SPJ3

Select the correct answer.
What statement best describes fault isolation?

Answers

The statement that best describes fault isolation is that Fault Isolation is known to be the area of knowing the cause of an issue.

What is  fault isolation?

Fault Isolation is also known to be the way or method use in  knowing the cause of an issue.

It is also known as fault diagnosis as it helps to deals with a lot of methods that can help one to be able to isolate the component or the device that is causing or leading to the error.

Learn more about isolation from

https://brainly.com/question/27507161

#SPJ1

I need the answer with c++
The question : Implement the class "Rectangle" with sides parallel to the coordinate axes. 1.Provide for the possibility of moving rectangles on the plane. 2.Provide for the possibility of changing sizes. 3.Provide for the possibility of constructing the smallest rectangle containing two given rectangles. 4.Provide for the possibility of constructing the rectangle that is a common part (intersection) of two rectangles. 5.Provide for the possibility of calculating the length of half the diagonal of a rectangle.

Answers

Using the knowledge of computational language in C++ code we found that this code can be written as:

The code can be found in the attached image.

How to writte the C++ code ?

So from the c++ code you can write the geometric figure as

#include <bits/stdc++.h>

struct Point {

   int x, y;

};

bool doOverlap(Point l1, Point r1, Point l2, Point r2)

{

   if (l1.x > r2.x || l2.x > r1.x)

       return false;

   if (r1.y > l2.y || r2.y > l1.y)

       return false;

    return true;

}

/* Driver program to test above function */

int main()

{

   Point l1 = { 0, 10 }, r1 = { 10, 0 };

   Point l2 = { 5, 5 }, r2 = { 15, 0 };

   if (doOverlap(l1, r1, l2, r2))

       printf("Rectangles Overlap");

   else

       printf("Rectangles Don't Overlap");

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

In java language I want the code

Answers

Answer:

code was too long to paste here, attached below

Design a flowchart or pseudocode for a program that accepts two numbers from a user and displays one of the following messages: First is larger, Second is larger, Numbers are equal?

Answers

The pseudocode of the program will ask of two numbers form the user, compare the numbers and print out statements depending on the result of the comparison.

What is a pseudocode?

Pseudocode is an informal way of programming description that does not require any strict programming language syntax. The pseudocode describes how the code will be written and structured.

Therefore, the pseudocode follows the structure below

Ask the user for two numbersUse the greater than and equals to operator to check if any number is greater than the other or they are the sameFinally, we print the statements: First is larger, second is larger or numbers are equal depending on your result in comparison of the numbers.

learn more on pseudocode here: https://brainly.com/question/14101532

#SPJ1

What will be printed to the screen when the following program is run?

Answers

Answer:

false

Explanation:

the parenthesis contains 2 true statements (5 is greater than 4 and 10 is greater than or equal to 10)

outside the parenthesis is the not, so the true parenthesis is negated to false

this means the value of a is false

Which method can be used for making a robot perform a different set of functions?

a. changing a robot's sensors
b. dismantling a robot
c. creating a new robot
d. rewriting software

Answers

Answer:

D. Because rewriting it can make it preform new functions.

Explanation:

In Exercises 1–4 construct the dual graph for the map shown.
Then find the number of colors needed to color the map so
that no two adjacent regions have the same color.

Answers

Answer:

10.8 Graph Coloring

A coloring of a simple graph is the assignment of a color to each vertex of the graph so that no

two adjacent vertices are assigned the same color.

Chromatic number

The chromatic number of a graph is the least number of colors needed for a coloring of this graph.

The Four Color Theorem

The chromatic number of a planar graph is no greater than four.

10.8 pg. 733 # 3

Construct the dual graph for the map shown. Then find the number of colors needed to color the

map so that no two adjacent regions have the same color.

a

b c d e

f

At least three colors are needed to color the

graph because of triangle 4abc exists in the

graph.

10.8 pg. 733 # 7

Find the chromatic number of the given graph.

a

b

c

d

Since this graph forms two triangles, 4abd and

4bcd, we can color this graph with at least 3

colors where a and c are the same colors.

a

b

c

d

10.8 pg. 733 # 9

Find the chromatic number of the given graph.

1

ICS 241: Discrete Mathematics II (Spring 2015)

a

e

b

c

d

This graph can be colored with two colors like

shown.

a

e

b

c

d

10.8 pg. 734 # 19

The mathematics department has six committees, each meeting once a month. How many different

meeting times must be used to ensure that no member is scheduled to attend two meetings at the

same time if the committees are C1 = {Arlinghaus, Brand, Zaslavsky}, C2 = {Brand, Lee, Rosen},

C3 = {Arlinghaus, Rosen, Zaslavsky}, C4 = {Lee, Rosen, Zaslavsky}, C5 = {Arlinghaus, Brand},

and C6 = {Brand, Rosen, Zaslavsky}?

We will first draw the intersection graph of the given sets.

C1 C2

C3

C5 C4

C6

From here, it is easy to see that we need at least 5 colors like so:

C1 C2

C3

C5 C4

C6

Therefore, 5 meeting times are needed. Committees C4 and C5 can meet at the same time.

Explanation:

done-_-

What are the common operations performed on character strings?

Answers

Answer(:

•concatenation

• scanning

• substringing

• translation

• verification

if you want to remember means csstv;-)

Explain the stages of the evolution of the idea of IDS and its importance of security, military and examine the importance of intrusion detection systems and categories classifications, and where can put IDS to reduce the risk to the network.

Answers

Intrusion detection systems (IDS) is a software type that is used to check for violations of policy or any other malicious activity. IDS detects and prevents unauthorized activities.

What is IDS?

Intrusion detection systems (IDS) is the technological system that is built to check for any suspicious and unauthorized activities. They detect the network system and the system logs.

The unauthorized and suspicious things are scanned and made an alert. It is very crucial in many fields as many documented and private items are needed to be protected.

Therefore, IDS can be of various types like host, network, perimeter, and VM.

Learn more about IDS here:

https://brainly.com/question/20709626

#SPJ1

Other Questions
lab report: LightIntroductionWhat was the purpose of the experiment?Type your answer here:What were the independent, dependent, and control variables in your investigation? Describe the variables for each part of the experiment.Type your answer here:Experimental MethodsWhat tools did you use to collect your data?Type your answer here:Describe the procedure that you followed to collect your data.Type your answer here:Data and ObservationsRecord your observations in the data tables.Type your answer here:Table 1. Angles of Incidence and Angles of Reflection for a Beam of Light Reflected off a MirrorAngle of incidence ()Angle of reflection ()Table 2. Angles of Incidence and Angles of Refraction for a Beam of Light Refracted through a Glass LensAngle of incidence ()Angle of refraction () Stride, Inc. All rights reserved. No reproduction without written consent of Stride, Inc. Page 1 of 2Science | Lab Report | LightConclusionsDraw a diagram (develop a model) that shows what happens to light when it reflects off a mirror. Look for patterns in your data to help you develop your model. Hint: Is the angle of reflection always greater than, less than, or equal to the angle of incidence? Include labels.Type your answer here:Use your model to predict the angle of reflection of a beam of light reflected off a mirror if the angle of incidence of the beam of light is 40 degrees. Type your answer here:Draw a diagram (develop a model) that shows what happens to light when it is refracted through a glass lens. Look for patterns in your data to help you develop your model. Hint: Is the angle of refraction always greater than, less than, or equal to the angle of incidence? Include labels.Type your answer here:help I will give u brainist Use the number line to identify the least value, first quartile, median, third quartile, and greatest value of the data.Temperatures (in $\degree$ C): 15, 11, 14, 10, 19, 10, 2, 15, 12, 14, 9, 20, 17, 5 Why did some Federalists respond to the Louisiana Purchase by plotting to secede from the Union? Which of the following pairs of numbers contain like fractionsA. 3/2 and 4 44B. 3/2 and 2/3C.6/7, and 1 1/5,D.5/6 and 10/12 What is the area of the circle? Schizophrenia is a mental disorder that is often confused with __________ disorder. a. dissociative identity b. obsessive-compulsive c. conversion d. bipolar please select the best answer from the choices provided a b c d In the rectangular prism shown above, the distance between any two neighboring points on a line segment is the same. For example, the distance between points 1 and 2 is the same as the distance between points 13 and 20, which is the same as the distance between points 15 and 16. Place the cross sections indicated by the tiles in order from least area to greatest area. 5 2/3 1/6 = i need more letters Whats the answer?????? PLEASE HELP !! READ WORKS >> What first did the comic book character Black Panther achieve with its debut in 1966? Write the phrase as an expression.a number t cubed Which is defined as a cell structure made of DNA that gives all of the master instructions for the cell? f(x)=2x + 7 - x24f(2)=Be sure to simplify your answer.Enter Sum of Two Numbers: Write a program that stores the integers 50 and 100 in variables and stores the sum of these two in a variable named total. Display the total on the screen. the structure labeled 2 represents a molecule of aDNA bmRNA ctRNA drRNA Me duele un diente, tengo que ir al..A. BomberoB. PoliciaC. DoctorD. Dentista pleae awnser :))) hhoh Which student is most clearly using evidence to support an opinion?A. ElsaB. ZoeC. NickD. Ray Calculate the pressure (in kpa) of 1.5 mole of helium gas at 354 k when it occupies a volume of 16.5l. Which division problem is represented with this model?1/531/541/321/43