What are the real-life applications of coding? at least 5 to 6 lines anyone

Answers

Answer 1

The real-life applications of coding is that they are used in:

Traffic LightsCoffee Machines, etc.

What are useful applications of codes?

Coding is known to be a tool that helps to make  a composition of instructions that a computers needs to follow.

Note that in real life, Coding helps programmers to create programs, such as websites and apps that are used in Traffic Lights, etc.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1


Related Questions

Question 4 of 10
which phrase best describes algorithmic bias?
o a. when systematic errors in a program create unfair outcomes
b. when companies avoid using algorithms in their software
c. when programmers purposely create biased software
d. when people insist on doing things without technology

Answers

The phrase that best describes algorithmic bias is that when systematic errors in a program create unfair outcomes.

What is Algorithmic bias?

This is known to be a term that tells about the systematic and repeatable errors as seen in a  computer system that forms "unfair or bad" outcomes.

Therefore, we can say that the phrase that best describes algorithmic bias is that when systematic errors in a program create unfair outcomes.

Learn more about algorithmic bias from

https://brainly.com/question/22236556

#SPJ1

What does the processor contain?

Answers

Answer:

It consists of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is often simply referred to as the processor.

Explanation:

The ipv6 address fields are 128 bits long, and as such there is no need to extend ip addressing by using either dhcp or nat (i.e., these protocols become obsolete). true false

Answers

Answer:

True

Explanation:

according to coursehero it's true

The ipv6 address fields are 128 bits long, and as such there is no need to extend ip addressing by using either dhcp or nat (i.e., these protocols become obsolete, its true.

An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint machine in an Internet Protocol Version 6 (IPv6) network. IPv6 is the beneficiary to a previous addressing infrastructure, IPv4, which had limitations IPv6 was created to overcome.

What is IPv6 explained?

IPv6 is an Internet Layer protocol for packet-switched internetworking and gives end-to-end datagram transmission across multiple IP networks, closely sticking to the design principles set in the previous performance of the protocol, Internet Protocol Version 4 (IPv4).

What are the IPv6 address types?

The three types of IPv6 addresses are unicast, anycast, and multicast.

Unicast addresses specify a single interface.

Anycast addresses specify a set of interfaces in such a way that a packet sent to an anycast address is delivered to a component of the set.

To learn more about Internet Layer protocol, refer

https://brainly.com/question/5296366

#SPJ2

A 32-second sound clip will be recorded. The sound will be sampled 16000 times a second. Each sample will be stored using 8 bits. Calculate the file size in kilobytes. You must show all of your working. ​

Answers

The  Audio Size of the 32-second sound clip is given as: = 500 kb

See calculation and explanations below.

What is Audio Size?

The term audio size is used to refer to the size of an audio file measured in bytes, or kilobytes, or megabytes depending on it's size.



What is the calculation of the size of the audio file?

Step 1

The formula for calculating the Audio Size is:

= Sampling rate x sample size x time x channel

= 16,000hz x 8bits x 32 x 1 (We assume it is only one channel since the number of channels is not specified)

= 4,096,000 bits

Step 2 - We convert to bytes.

To convert to bytes, we divide our answer in bits by 8; hence

= 4,096,000/8

= 512,000

Step 3 - convert to kilobytes by dividing by 1024

Therefore, answer in kilobytes

= 512,000/1024

= 500 kb

See more about kilobytes at:
https://brainly.com/question/15166519
#SPJ1

Sum of Two Numbers: Write a program that stores the integers 50 and 100 in variables and stores the sum of these two in a variable named total. Display the total on the screen.

Answers

Answer:

fifty = 50 #variable to store 50

hundred = 100 #variable to store 100

total = fifty + hundred #add the two in a variable named total

print(total) #display on screen

Development
Select the correct answer from each drop-down menu.
What is DHTML?
DHTML is ______ . It’s allows you to add functionality such as ______

The answer options for part 1 are A: an updated version of html B: a version of html meant for mobile devices or C: a set of technologies that allows developers to create interactive websites. Part 2 answer options are A:loading pages in the background B:automatic sign in or C: drop down menus and roll over text

Answers

Answer:

Part 1: C

Part 2: C

Explanations:

Answer

DHTML is ______. It allows you to add functionality such as ______

a set of technologies that allows developers to create interactive websites drop-down menus and rollover text

I hope this help

BTW PLATO

What are the fundamentals of data and signals ?

Answers

Answer:

The sine wave is the most fundamental form of a periodic analog signal.

Explanation:

What technology does kroger’s edge technology and amazon’s just walk out technology leverage?.

Answers

They leverage smart engineering from the best of the best people to make the company more humanly capable of extraordinary measures

Amazon's simply walk out technology and Kroger's edge technology both employ intelligent agent technology.

What is the intelligent agent?

The Intelligent agent is a software that may complete tasks or make judgments depending on its surroundings, input from users, and past experiences. These applications can be used to collect data automatically on a predetermined schedule or in response to human input in real time.

In general, intelligent software agents are computer programs that may be installed on a computer system or network and launched to carry out tasks in the background, frequently while the computer is busy with other tasks.

Therefore, it is an intelligent agent.

To learn more about the technology, refer to:

https://brainly.com/question/15059972

#SPJ2

the japanese call the practice of stopping production when a defect occurs

Answers

Answer:

Jidoka

Explanation:

hope this helps:)

30 points


felicity is on a field trip to the local zoo. she notices an old watchtower. the sun is directly behind this watchtower, drawing the attention towards the borders and outlying features of the watchtower. what effect is felicity observing?
felicity is observing the _____ effect.

Answers

Answer:

I belive it's the Contre-jour effect :))))

Explanation:

different between simplex and duplex data transmission mode​

Answers

In simplex mode, Sender can send the data but that sender can't receive the data. In half duplex mode, Sender can send the data and also can receive the data but one at a time. In full duplex mode, Sender can send the data and also can receive the data simultaneously.

Develop a command sequence would you use to alter the amount of space between the text in a text box and the text box border?.

Answers

The use of the Line and Paragraph Spacing command can  help one to alter the amount of space between the text in a text box and the text box border.

Which command changes line spacing?

When one click on Home tab, one should click the Line and Paragraph Spacing command, and when one has select the line spacing that one needs, the selected line spacing will alter in the document.

Note that the use of the Line and Paragraph Spacing command can  help one to alter the amount of space between the text in a text box and the text box border.

Learn more about command sequence from

https://brainly.com/question/13258375

#SPJ1

A ____ is an outdated and inefficient networking device that accepted signals from a transmitting device and repeated those signals to all other connected devices in a broadcast fashion

Answers

Answer:

Hub

Explanation:

A hub is an inefficient old device that broadcasts a given message to all nodes connected to the interfaces on it. It has a high security risk.

How do smartphone screens work?

Answers

Smartphones screens work Using electricity

Answer:

Touchscreens work using electricity. The screen is made of glass, an insulating material – it cannot carry an electric current.

Explanation:

So I got the MSI GE76 Raider and I dont know if I should get a new better gaming laptop or not, is the GE76 good for gaming?

Answers

Answer:

yes it is

Explanation:

The MSI GE76 Raider is one of the best gaming laptops for those looking for a desktop replacement. It even brings excess amounts of RGB lighting courtesy of a full light bar under the wrist rest. Of course, that all comes at a cost.

Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve this. On which tab is the Ruler option found?

Answers

Based on the above scenario,  the tab that is where one can find the Ruler option is the View tab.

On which tab is the ruler option Seen?

One can see the ruler option in the View tab that is in the tool bar at the top of the slide screen. Then look for the Ruler option in the Show group.

Therefore,  Based on the above scenario,  the tab that is where one can find the Ruler option is the View tab.

Learn more about Ruler option from

https://brainly.com/question/16399272

#SPJ1



If I want to make it look like slide number one is turning a page to slide number two, what
effect needs to be applied?

Answers

Answer:

Im not certain but I think thwir is one called flip

Explanation:

Kind of works like a book if thats what your asking for

While browsing the internet, you notice that your browser displays pop-ups containing advertisements that are related to recent keyword searches you have performed. what is this an example of

Answers

Answer:

Cookies or targeted advertising.

What kind of goal does ariel set when he works to graduate from high school in four years? short term long term normative fantasy

Answers

The type of goal that Ariel will set so that she can be able to works to graduate from high school is  one that has to be long term.

What are personal goals ?

These kind of goals are known to be things or items that a person is hoping on getting or achieving.

Therefore,  the type of goal that Ariel will set so that she can be able to works to graduate from high school is  one that has to be long term as it will be one that will last for a very long time.

Learn more about goals from

https://brainly.com/question/1512442

#SPJ4

Answer:

It is a long term project

Explanation:

Graduation high school well I mean it kinda gonna take a long time I mean 4 years I can't even count to 4!!

what is full form of RAM??? ​

Answers

Answer:

Random Access Memory, it's used to store working data and machine codes

Explanation:

Hope it helped !
Adriel

what are project scope requirements?

Answers

Explanation:

Defining project scope requires input from the project stakeholders. They work with project managers to establish the key elements of budget, objectives, quality and timeline. To determine scope, project managers must collect requirements for what the stakeholders need from the project.

Answer:

The project scope outlines all the work required to deliver a project.

Explanation:

as well as any factors that define project sucess.

Select the correct answer.
What unit of measure do videographers and lighting professionals use to measure color temperature?
A.
lux
B.
fahrenheit
C.
degrees
D.
kelvin

Answers

Answer:

B I think be is the answer

when you start a new, blank document, you usually end up changing the font to arial 11.5 point. how can you make these settings the default for this and all future new documents?

Answers

The fonts setting can be change to default by following the mentioned steps.

1)opening the format menu,

2)after that, click Font,

3)then click the Font tab.

4)Make the needed changes that you want, and then click Default.

What is font?

A font is a set of printable or displayable text character s in a specific style and size.

These are the complete set of character like numbers, letters, and symbols/icon within a typeface, which is the design of the characters.

Hence, we can easily change the fonts setting to default.

Learn more about fonts here,

brainly.com/question/14934409

#SPJ1

9.2 lesson practice ​

Answers

Answer:

6 columns/items

Explanation:

grid starts off as an empty list ( [ ] ), so right now it has 0 items/columns.

After that, 3 new items ("frog", "cat", "hedgehog") have been appended to grid, it now has 3 items

Finally another 3 items are appended to grid ("fish", "emu", "rooster"), finally grid ends up with 6 items in total.

How could you share the original text to a co-worker and provide the hash for them to verify that nothing has been altered in the original text

Answers

The original text can be shared to a co-worker through the use of sender's private key.

What is sender's private key?

Digital signatures is one that make use of the sender's private key to encrypt any kind of given hash.

Note that Hashing can tell that data that has not changed in  the act of transmission and the original text can be shared to a co-worker through the use of sender's private key.

Learn more about private key from

https://brainly.com/question/15346474

#SPJ4

How to construct a speaking library presentation database. how will you use this library and database in the furture? based on what you have learned in this unit, why do you think it is important to have your own speaking library and presentation database? your essay should be 200-500 words in length... please help

Answers

To construct a speaking library presentation database, you should write what a speaking library is, the importance of speaking library in the present and future, and how to open a speaking library.

What is a speaking library?

A speaking library is a place where audiobooks are present, which can be listened by people.

The importance of a speaking library is blind people can also listen to them and people who cannot read.

Thus, to construct a speaking library presentation database, you should write what a speaking library is, the importance of speaking library in the present and future, and how to open a speaking library.

Learn more about speaking library

https://brainly.com/question/1348481

#SPJ1

Question #1
dropdown
choose the term described.

a variable in a program that represents a class and is created by an assignment statement

function created within a class
definition

constructor
method
instance

Answers

Answer:

instance - a variable in a program that represents a class and is created by an assignment statement

method - function created within a class definition

Explanation:

A class is made up of the members fields and methods.

Fields are variables in the class and methods are functions in the class.

An instance is a copy of the class also called an object

Can someone give me an earsketch song of summer to turn in

Answers

Answer: This is not mine.

from earsketch import *

from random import *

init()

setTempo(120)

genre = readInput("Pick a genre: Hiphop, RNB, or Rock.")

if genre == ("Hiphop"): measure = []

fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 1, 5)

fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 7, 11)

fitMedia(CIARA_SET_DRUMBEAT_5, 3, 7, 11)

fitMedia(CIARA_SET_BASSLINE_2, 2, 7, 11)

setEffect(1, VOLUME, GAIN, 0, 4, -60, 6)

setEffect(1, VOLUME, GAIN, -60, 6, 0, 7)

fillDrum = CIARA_SET_DRUMBEAT_5

beat = "0+++0+++0-000+00"

index = randint(1,5)

for measure in range (1, 7, 1):

  for index in range (index):

       makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(7, 11)

fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 10, 16)

fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 18, 22)

fitMedia(CIARA_SET_DRUMBEAT_5, 3, 18, 22)

fitMedia(CIARA_SET_BASSLINE_2, 2, 18, 22)

for measure in range(11, 18, 1):

   makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(17, 22)

fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 23, 27)

fitMedia(CIARA_SET_THEME_ATMOS_2, 1, 29, 33)

fitMedia(CIARA_SET_DRUMBEAT_5, 3, 29, 33)

fitMedia(CIARA_SET_BASSLINE_2, 2, 29, 33)

for measure in range(22, 29, 1):

 makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(29, 33)

if genre == ("RNB"): measure = []

fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 1, 5)

fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 7, 11)

fitMedia(CIARA_SET_DRUMBEAT_1, 3, 7, 11)

fitMedia(CIARA_SET_BASSLINE_2, 2, 7, 11)

setEffect(1, VOLUME, GAIN, 0, 4, -60, 6)

setEffect(1, VOLUME, GAIN, -60, 6, 0, 7)

fillDrum = CIARA_SET_DRUMBEAT_1

beat = "0+++0+++0-000+00"

index = randint(1,5)

if measure in range (1, 7, 1):

   for index in range (index):

       makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(7, 11)

fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 10, 16)

fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 18, 22)

fitMedia(CIARA_SET_DRUMBEAT_1, 3, 18, 22)

fitMedia(CIARA_SET_BASSLINE_2, 2, 18, 22)

for measure in range(11, 18, 1):

   makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(17, 22)

fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 23, 27)

fitMedia(CIARA_SET_THEME_ATMOS_1, 1, 29, 33)

fitMedia(CIARA_SET_DRUMBEAT_1, 3, 29, 33)

fitMedia(CIARA_SET_BASSLINE_2, 2, 29, 33)

for measure in range(22, 29, 1):

   makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(29, 33)

if genre == ("Rock"): measure = []

fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 1, 5)

fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 7, 11)

fitMedia(RD_ROCK_POPELECTRICBASS_1, 3, 7, 11)

fitMedia(CIARA_SET_BASSLINE_2, 2, 7, 11)

setEffect(1, VOLUME, GAIN, 0, 4, -60, 6)

setEffect(1, VOLUME, GAIN, -60, 6, 0, 7)

fillDrum = RD_ROCK_POPELECTRICBASS_1

beat = "0+++0+++0-000+00"

index = randint(1,5)

for measure in range (1, 7, 1):

   for index in range (index):

       makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(7, 11)

fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 10, 16)

fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 18, 22)

fitMedia(RD_ROCK_POPELECTRICBASS_1, 3, 18, 22)

fitMedia(CIARA_SET_BASSLINE_2, 2, 18, 22)

for measure in range(11, 18, 1):

   makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(17, 22)

fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 23, 27)

fitMedia(RD_ROCK_POPELECTRICLEAD_2, 1, 29, 33)

fitMedia(RD_ROCK_POPELECTRICBASS_1, 3, 29, 33)

fitMedia(CIARA_SET_BASSLINE_2, 2, 29, 33)

for measure in range(22, 29, 1):

   makeBeat(fillDrum, 3, measure, beat)

def myFunction(startMeasure, endMeasure):

   fitMedia(CIARA_SET_BASSLINE_1, 4, startMeasure, endMeasure)

myFunction(29, 33)

finish()

Explanation:

How are computers classified into different types? Explain ​

Answers

Computers differ based on their data processing abilities. They are classified according to purpose, data handling, and functionality. ... According to data handling, computers are analog, digital, or hybrid. Analog computers work on the principle of measuring, in which the measurements obtained are translated into data.

Targeted attacks like spear phishing are:.

Answers

Answer:

type of phishing attacks that targets specific individuals or organizations typically through malicious emails. [tex]\sqrt{x} \alpha \beta \pi[/tex] 12345 [tex]\lim_{n \to \infty} a_n[/tex]

Targeted attacks like spear phishing are frequently employed in targeted assault campaigns to enter a someone's account or pose as that person.

What is spear phishing?

Spear phishing is defined as an email or other electronic communication scam that targets a particular person, group, or company.

It is lao defined as a kind of phishing assault that uses malicious emails to target particular people or organizations.

When an unsuspecting victim replies to a phony email demand for action, this is known as spear phishing.

Giving passwords, credit card information, clicking links to verify shipment details, or transferring money are examples of actions that fall under this category.

Thus, targeted attacks like spear phishing are frequently employed in targeted assault campaigns to enter a someone's account or pose as that person.

To learn more about spear phishing, refer to the link below:

https://brainly.com/question/24156548

#SPJ2

Other Questions
PLEASE HURRY What is one technology that has contributed to human population growth in the past that could hinder it in the future? How will this happen? PLEASE ANSWER ILL MARK BRAINIEST11. Tu_______ a la escuela a las ocho de la maana todos los dias.1.fuiste2.iba3.ibas4.iria PLS HELPPPPPP!!!!!!The functions graphed shows the distances, in miles, for two drivers x hours after driving.Select ALL correct statements about the graph.Question 5 options:The intersection (1, 60) indicates the time in hours when Celia and Tayvin are traveling at the same speed.Celia drove at a faster rate than Tayvin.Tayvin drove at a faster rate than Celia.The intersection (1, 60) indicates the time in hours when Celia and Tayvin are the same distance from the city. Find the center of the circle whose equation is (x - 5) 2 + (y + 3) 2 = 6. Libro 20,000 mil lenguas de un viaje submarino.El capitn Nemo los llev a una gruta donde encontraron un gran concha y dentro una perla que aproximadamente tena el tamao de un coco, al regresar de all vieron como un tiburn atacaba a un pescador dejndolo malherido inmediatamente intervino el capitn Nemo pero el tambin corri peligro, afortunadamente intervino Ned con su arpn atravesndole el corazn salvndole la vida.Falso o Verdadero. Which represents the inverse of the function f(x) =4x? PLS HELP MERCI! Answer in a complete sentence using the verb savoir. Qui est le prsident du Cameroun? two battles or events during the war of 1812 Which of the following happens to an acid when it reacts with another substance?A. Receives hydrogen ionB. It receives a hydroxide ionC. It donates a hydroxide ionD. It donates a hydrogen ion By the end of the novel, we know that Gatsby has made his money as a bootlegger during Prohibition. What does this tell us about his pursuit of the American Dream?-A) Gatsby believes hard work and patience will help him win Daisy back.B) Gatsby is a strict follower of societal rules and laws.C) Gatsby believes money is an unimportant part of his dream to win Daisy back.D) Gatsby is willing to break the law to make enough money to try and win Daisy back. Choose whether the statement is a fact or an opinion.The first Monday in September is celebrated as Labor Day in the United States. Which one geos first to last 3/4 or 1/3 or 5/8 What does mitosis help with in living organisms? (Select all that apply.) A. It is the reason organisms can grow. B. It provides the energy for the cell. C. It helps heal wounds. D. It helps to replace damaged cells. Which quote best supports the idea expressed in the sentence teachers are worried that the rise in standardized testing will inhibit their ability to give their students a passion for learning which of these a part of good dental hygiene What motivates Mrs. Flowers to help Marguerite? In I Know Why the Caged Bird Sings Marie uses a CSS file to style the elements in her HTML document. What is the advantage of using an external CSS file to style HTML elements I am offering 45 points, because I really need a good, complete answer. As a result of your Zombie Apocalypse, the grass at a local park will no longer be mowed. What type of succession is this (primary or secondary)? Describe the stages of succession that will occur in the next 100 years. . Find the area of a circle with acircumferenceof 11( 3.14 )feel? Identify and discuss 5 effective programs that could assist in curbing undesirable behavior in youth.