Name one characteristic of natural languages that prevents them from being used as programming languages.

Answers

Answer 1

Answer:

Ambiguity.

Explanation:

Natural language of human beings are believed to be ambiguous, as it often required settings punctuation, and intonation to determine certain meanings correctly.

Also is the fact that natural language sometimes has more than one meaning for the same words.

Hence, one characteristic of natural languages that prevent them from being used as programming languages is AMBIGUITY.


Related Questions

Define a class named person that contains two instance variables of type string that stores the first name and last name of a person and appropriate accessor and mutator methods. Also create a method named displayDetails that outputs the details of a person

Answers

Answer:

Answered below

Explanation:

//Program is written using Java programming language.

Class Person {

private string firstName;

private string lastName;

void set firstName(string a){

firstName = a;

}

string getFirstName(){

return firstName;

}

void setLastname( string b){

lastName = b;

}

string getLastName( ){

return lastName;

}

void displayDetails( ) {

System.out.print(firstName);

System.out.print (lastName);

}

}

//Test program

Class Main{

public static void main(String args [] ){

Person person = new Person( )

person.setFirstName("Karen")

System.out.print(person.getFirstName)

person.displayDetails()

}

}

how do u mark brainlyest on the computer

Answers

Answer:

Explanation:

An answer on Brainly can only be marked as Brainliest if the individual who answered the question is not yourself, and if one week has passed since the answer was posted. Once the week has passed and the answer is still there (has not been removed) then a Brainliest button should appear that will allow you to mark the answer as Brainliest. Simply click the button and the answer will be marked as Brainliest.

Identify and give the application of the following operators.

(a) / (b) //​

Answers

Answer:

This answer depends on what language you're using, but in most languages, "//" is used to precede a one-line remark. "/" is used to divide a number by the other.  For example:

// this is a remark

var foo = x / y;

There are exceptions to both, although the / is almost universally used for division.  One exception would be assembly of course, I don't know if there are any higher level languages that don't use the slash.

In REPL.it, the interface includes an Editor and an Interpreter.
True
False

Answers

Answer:

Its true.

Explanation:

Buying a new computer for which of these reasons is most likely a sound
financial decision?
A. You liked the ad for it on TV.
B. You need it to do your homework.
O c. Your friend has one.
D. You were persuaded by a salesperson.

Answers

Answer:

b. you need it to do your homework

Explanation:

What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centimeters?

Answers

Answer:

guys all you have to do is divide and multiply 812x913=741356

and this answer they give you going divide 741356. 1225

so easy guys let me in the comment

Explanation:

What stores all software and files on your computer and reads and writes data onto a spinning magnetic or optical disk?

Answers

Answer:

Depends. could be an external opticial drive, a scuzi drive, a real to real tape system, or just a simple electromagnetic hard drive with speeds of 1000 rpm or more

WHat is 100 digits of pi?

Answers

Answer:

3.1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923078164 0628620899 8628034825 3421170679

Answer:

And now

AsapSCIENCE presents-

100 digits of π

3.14159, this is π

Followed by 2-6-5-3-5-8-9

Circumference over diameter

7-9, then 3-2-3

OMG! Can't you see?

8-4-6-2-6-4-3

And now we're on a spree

38 and 32, now we're blue

Oh, who knew?

7, 950 and then a two

88 and 41, so much fun

Now a run

9-7-1-6-9-3-9-9

Then 3-7, 51

Half way done!

0-5-8, now don't be late

2-0-9, where's the wine?

7-4, it's on the floor

Then 9-4-4-5-9

2-3-0, we gotta go

7-8, we can't wait

1-6-4-0-6-2-8

We're almost near the end, keep going

62, we're getting through

0-8-9-9, on time

8-6-2-8-0-3-4

There's only a few more!

8-2, then 5-3

42, 11, 7-0 and 67

We're done! Was that fun?

Learning random digits

So that you can brag to your friends

Explanation:

NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER
Which option is typically only used when utilizing self joins?

display name

alias

relationship

primary key

Answers

Answer:

relationship

Explanation:

Answer:

I agree the should be C)relationship

Explanation:

edg 2021

Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks

Answers

Answer:

Auditing and logging

Explanation:

Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.

To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.

Therefore, in this case, the correct answer is "Auditing and logging."

Wrtie down some containerization technology.

Answers

Answer:

Some containerization technologies are listed as follows: Docker, Docker Enterprise, Amazon Elastic Container Service, Container Linux, Amazon's AWS, Microsoft's Azure Container, etc.

Explanation:

Containerization technology is a computer technology that packages software codes and their dependencies in isolated user spaces called containers so that the software can run uniformly and consistently on any infrastructure, using a shared operating system.  It is the modern alternative and companion to virtualization.  In simple terms, containerization is the process which packages an application with the required libraries, frameworks, and configuration files so that it can efficiently run in various computing environments.

What are the three general methods for delivering content from a server to a client across a network

Answers

Answer:

Answered below.

Explanation:

The three general methods consist of unicasting, broadcasting and multicasting.

Casting implies the transfer of data from one computer (sender) to another (recipient).

Unicasting is the transfer of data from a single sender to a single recipient.

Broadcasting deals with the transfer of data from one sender to many recipients.

Multicasting defines the transfer of data from more than one sender to more than one recipients.

According to shared security model, which two are a customer's responsibilities in Oracle Cloud Infrastructure (OCI)?

Answers

Answer:

According to shared security model, a customer's responsibilities in Oracle Cloud Infrastructure (OCI) are:

1. Workloads security: The customer is responsible for protecting the work function or a distinct capacity, like a Hadoop node, a Web server, a database, or a container, that it puts on the cloud.

2. Services configuration:  The customer is also responsible for securing the specifications that describe the different aspects of its managed service.

Explanation:

Responsibilities are shared between Oracle and the customers using the Oracle Cloud Infrastructure (OCI).  Oracle is solely responsible for the security of the underlying cloud infrastructure (such as data-center facilities, hardware, and software systems), while the customer is responsible for securing the workloads and configuring their services to suit their individual needs.

What will the output of the statements below? System.out.println(9%2); System.out.println(12%6); The output of the first statement is * The output of the second statement is​

Answers

Answer:

You get Exact 30 print of that sentence on a comadore 64

Explanation:

Just simple basic science. hope this helps

The _____ Tag surrounds all content that will be visible on your web page for all to users to see on that website.

Answers

Answer:

The body tag

Explanation:

HTML has several tags; however, the tag that handles the description in the question is the body tag.

It starts with the opening tag <body> and ends with closing tag </body>

i.e.

<body>

[Website content goes in here]

</body>

Any text, image, object etc. placed within this tag will be displayed in the website

Fix the infinite loop so that it counts from 3 down to 1.public class Loop1{public static void main(String[] args){int x = 3;while (x > 0){System.out.println(x);}}}

Answers

Answer:

Include x-- right after the print statement

Explanation:

Given:

The above lines of code

Required

Edit to countdown from 3 to 1

The above code (as it is) prints 3 in infinite times. To make it countdown to 1, we simply include a decrement operation.

Initially, the value of x is 3: int x = 3;

And the condition is that the loop is to be repeated as long as x > 0

All we need to do is to include x-- right after the print statement.

This  operation will reduce the value of x on every iteration as long as the condition is true.

Hence, the complete code is:

public class Loop1{

   public static void main(String[] args){

       int x = 3;

       while (x > 0){

           System.out.println(x);

          x--;

       }}}

NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which section available in the Design view for the form actually includes the record data itself?

header

footer

detail

Overview

Answers

Answer:

the answer is detail

Explanation:

please it's detail

The Design view for the form actually includes the record data itself will be known as Overview.

What is a detail?

If the file is completed, then all the record that was done during completing the file will be mentioned in the section known as detail.

The Design view for the form actually includes the record data itself will be known as detail.

Then the correct option is D.

More about the detail link is given below.

https://brainly.com/question/9208069

#SPJ2

When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and frameworks

Answers

Answer:

In order to observe best practices, and to meet with technical and other requirements, organizations often use frameworks for cybersecurity compliance and regulatory compliance. These frameworks provide best practices and guidelines to assist in improving security, optimizing business processes, meeting regulatory requirements, and performing other tasks necessary to achieve specific business objectives such as breaking into a particular market niche or selling to government agencies.

Many such frameworks exist, and the recommendations set out in them can impose difficult and often expensive demands on enterprise resources – especially in situations where an organization is subject to a number of regulatory compliance regimes, whose requirements it has to meet while maintaining its own strong cybersecurity status.

Explanation:

The ______ clause allows us to select only those rows in the result relation of the ____ clause that satisfy a specified predicate.

Answers

Answer:

1. Where,

2. From

Explanation:

In SQL query language when working on a database, a user can use certain clauses to carry out some functions.

Hence, The WHERE clause allows us to select only those rows in the result relation of the FROM clause that satisfy a specified predicate.

This is because the "Where clause" selects the rows on a particular condition. While the "From clause" gives the relation which involves the operation.

What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?

Answers

Answer:

Nothing

Explanation:

If a seperator value is provided as an argument within the split() method and the string does not include that value then the string will remain the same and will not be split. If no value is provided as an argument within the split() method, then the string that the method is being applied to will automatically be split in every space character (" ") that exists within it. This is the default value of split() when no argument is passed to it.

Write pseudocode for washing a car using at least five steps.

Answers

Answer:

#include <iostream>

int main()

{

bool carWashed{ 0 };

bool washCar{ 0 };

while(carWashed == 0)

{

 washCar();

}

if(washCar == 1)

{

carWashed{ 1 }

}

}

Explanation:

c++

please help me



Match the technology with the appropriate task.



1. graphics software

2. word processor

3. CAD

4. laptop

5. GPS​

Answers

Complete Question:

Match the technology with the appropriate task.

Column A

1. Graphics software

2. Word processor

3. CAD

4. Laptop

5. GPS

Column B

A. Create a company logo.

B. Get directions to a customer’s office.

C. Type a report.

D. Complete many types of tasks on a computer away from the office.

E. Design a building.

Answer:

1. A

2. C

3. E

4. D

5. B

Explanation:

1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.

2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.

3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.

4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.

5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.

Answer:

1. A

2. C

3. E

4. D

5. B

Which 3 statements are true about journal entries? (Quick Books)

(Select all that apply)

1.Total debits must equal total credits

2.You can post to Products and Services in a journal entry

3.When posting to the accounts receivable account, you must specify a vendor

4.When posting to the accounts receivable account, you must specify a customer

5.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

Answers

Answer:

1.Total debits must equal total credits

4.When posting to the accounts receivable account, you must specify a customer

5.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

Explanation:

1.

A Journal entry follows the concept of double-entry. In the double-entry principle, a debit entry equals a credit. After posting all the required entries total debits are equal to the total credits.

4.

The business makes sales to customers. Some sales are made on cash or some are made on credit. In the case of credit sales, the receivables are made. To record the credit sale entry we must specify the customer in the debit entry against the credit entry of sales.

5.

in recording the credit sales or purchases multiple receivable or payable accounts can be used and a single entry of sales of purchases can be posted against these accounts. For example

Journal Entry with multiple receivables accounts.

DR. Customers A $1,000

DR. Customers B $2,000

DR. Customers C $3,000

CR. Sales ______$6,000

The three statements that are true about journal entries are:

Total debits must equal total credits.When posting to the accounts receivable account, you must specify a customer.You can post to multiple accounts receivable and/or accounts payable accounts in the same journal entry

According to the question, we are to discuss about journal entries which is used in financial accounting.

As a result of this we can see that in journal entries When posting to the accounts receivable account, you must specify a customer.

Therefore, in journal entries Total debits must equal total credits.

Learn more about journal entries at;

https://brainly.com/question/25372704

A message of length 8x106bits is to be sent from host A to host B, routed through 2 packet switches. The transmission capacity of each of the three linksis 2 Mbps. Ignoring propagation, queuing and processing delay, how long will it take to move the message as a single packet from host A to host B assuming each packet switch uses store-and-forward switching

Answers

Answer:

Time from source host to 1st packet switch = 4 secs

Total time = 12 secs

Explanation:

Solution:

Message Length = [tex]8 x 10^{6}[/tex] bits

Each link is = 2Mbps

Assumption:

Each packet switch uses store - and - forward switching

So, in order to calculate the total time taken to move the message as a single packet from host A to host B with the above assumption, first we need to calculate the time required to sending message from source host to 1st packet switch.

For that,

we need to divide Length of the message to Transmission capacity of each link.

Time from source host to 1st packet switch = 8/2

Time from source host to 1st packet switch = 4 secs

Now, to calculate the total time taken till the destination = 4 x 3 hops

Total time = 12 secs

A production house needs an operating system that captures, saves, and generates information within specific time. Which type of operating system should the production house choose?

Answers

Answer:

A real-time operating system

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions. Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

There are different types of operating systems (OS) based on their functions and these includes;

I. Simple Batch System.

II. Multiprocessor System.

III. Desktop System.

IV. Multiprogramming Batch System.

V. Distributed Operating System.

VI. Network System.

VII. Realtime Operating System.

In this scenario, a production house needs an operating system that captures, saves, and generates information within specific time. Therefore, the type of operating system that the production house should choose is a real-time operating system.

A real-time operating system can be defined as an operating system (OS) that provides services to a system as they are required, without any form of delay or buffering of data.

The illegal copying of program​

Answers

Answer:Software piracy

Explanation:

4. What is the package name in which the Scanner class resides?

Answers

Related Articles. Scanner is a class in java. util package used for obtaining the input of the primitive types like int, double, etc. and strings.

Universal Container wants to understand all of the configuration changes that have been made over the last 6 months. Which tool should an Administrator use to get this information

Answers

Answer:

Set up audit trail

Explanation:

The administrator should set up an audit trail in order to get this information.

An audit trail would give him the record of all the configuration changes that have been made in a file or a database in the last 6 months.

Audit trails can be manual or electronic. It provides history and also documentation support. It can authenticate security and also help to mitigate challenges.

java Elements in a range Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain fewer than 20 integers. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds). For coding simplicity, follow each output integer by a comma, even the last one. The output ends with a newline. Ex: If the input is: 5 25 51 0 200 33 0 50 then the output is: 25,0,33, (the bounds are 0-50, so 51 and 200 are out of range and thus not output). To achieve the above, first read the list of integers into an array.

Answers

Answer:

The program in Java is:

import java.util.Scanner;

public class MyClass {

   public static void main(String args[]) {

     Scanner input = new Scanner(System.in);

     int n;

     n = input.nextInt();

     int [] mylist = new int[n+1];

     mylist[0] = n;

     System.out.print("List elements: ");

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

     int min,max;

     System.out.print("Min & Max: ");

     min = input.nextInt();

     max = input.nextInt();

     

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

   }

}

Explanation:

This line declares length of list

     int n;

This line gets length of list

     n = input.nextInt();

This line declares the list/array

     int [] mylist = new int[n+1];

This line initializes the element at index 0 to the length of the list

     mylist[0] = n;

This prompts user for elements of the list/array

     System.out.print("List elements: ");

The following iteration gets list elements

     for(int i = 1;i<n+1;i++){

         mylist[i] = input.nextInt();

     }

This declares the lower and upper bound (min, max)

     int min,max;

This line prompts user for elements of the list/array

     System.out.print("Min & Max: ");

This next two lines get the bound of the list/array

     min = input.nextInt();

     max = input.nextInt();

The following iteration prints the elements in the range

     for(int i=1; i < mylist.length; i++){

         if(mylist[i]>=min && mylist[i]<=max){

             System.out.print(mylist[i]+" ");

 }

}

What is design reference threat

Answers

it’s a threat ‘make it spicey’ so with design
Other Questions
solve for n -4.2n-1.7=2.08 Katie's deli can make 60 sandwiches in 4 hours. Stacy's can make double that in the same amount of time. How many sandwiches can Stacy's deli make in 6 hours Decide if the following sentence is grammatically CORRECT or INCORRECT.Ich bezahle fr das Buch.CorrectIncorrect A 275 g sample of a metal requires 10.75 kJ to change its temperature from 21.2 oC to its melting temperature, 327.5 oC. What is the specific heat of this metal Joanna is driving 185 miles to visit her family. She drives 68 miles in the morning, stops for lunch, and then drives the rest of the distance. How many miles did she drive after lunch?Use the variable m to represent the number of miles she drove after lunch.Which equation represents this situation and its solution?m + 68 = 185; m = 11768m = 185; m = 17m + 185 = 68; m = 117185m = 68; m = 17 if a large earthquake were to occur at san diego the earliest indication at another california location of the occurance of that earthquake would be the arrival of theA. S-waves at OceansideB. S-waves at San BernardinoC. P-waves at OceansideD. P-waves at San Bernardino PLEASE HELP ASAP!!Which is the best approximation for the value of 102?Answers:A.) 10B.) 11C.) 50D.) 51 ABE Question 2 How does paragraph 2 contribute to the text? A It helps the reader understand why Hansberry chose the work she did B It foreshadows Hansberry's difficulties and struggles in later life. It underscores how her parents' values influenced her education It gives the reader a sense of relief that Hansberry's first play was well received What is the constant of proportionality for the table? What does it represent? Reminder: k= y/x Jake organizes 48 marbles into packs. He places the same number of marbles into each pack. Howcould he arrange the marbles? true or false1 .The descendants of Abraham became known as the Jewish people---------------------- 2 . The Quran is the sacred text of Islam and is believed to contain revelations given to Mohammad-------------------------------------------------------------------------------------------------------------.3 . Followers of Islam believe in more than one God ----------------------------------------------------.4 . Judaism died out when Romans destroyed the Second Temple in Jerusalem in A . D . 66 ----------------------------------------------------------------------------------------------------------------------------5 . Christianity is based on the life and teaching of Jesus ------------------------------------------. Which statement best describes Mendel's principle of segregation? identify and explain one difference between the minnesota constitution and the US constitution explain what you believe to be the reason for this difference Question 41 ptsWhat is the mass of a rock sitting on a 10 meters high cliff if it has a potential energy of 500joules?50 kg10 kg5 kg1000 kg 2. Why do you think there's only one city shown on the map in the southern half of Israel? Which groups influence the creation of public policy? Check all that apply. Why Richard Pratt dislike Buffalo Bill Cody's Wild West? Please help!! 3/2 as a mixed number Read Shakespeare's "Sonnet 130.- What evidence supports the serious nature of the sonnet? Select two options. Albel O "My mistress eyes are nothing like the sun" Olf hairs be wires, black wires grow on her head.' O'Thave seen roses damask'd, red and white" My mistress' eyes are nothing like the sun; Coral is far more red, than her lips red: If snow be white, why then her breasts are dun; If hairs be wires, black wires grow on her head. I have seen roses damask'd, red and white, But no such roses seel in her cheeks; And in some perfumes is there more delight Than in the breath that from my mistress reeks. I love to hear her speak, yet well I know That music hath a far more pleasing sound: I grant I never saw a goddess go, My mistress, when she walks, treads on the ground: And yet by heaven, I think my love as rare, As any she belied with false compare. O "I love to hear her speak" O "And yet by heaven, I think my love as rare" Mark this and return Save and Exit NEK Submit Solve the system by substitution.x - 5y = 1- 2x + 9y = -1 what is the solution?