Peter wants to make sure his code is going to work. He has Sally act as the computer mentally checking each step and its results for the entire set of computer instructor. Sally is performing a ________.
A) Inspections
B) Walk-throughs
C) Desk check
D) Unit test

Answers

Answer 1
The answer is B walk throughs
Answer 2

The fact that Sally act as the computer by mentally checking each step means she's performing B. walk throughs.

What is a computer?

A computer simply means an electronic machine that's important to make one's work easier and faster.

In this case, the fact that Sally act as the computer mentally checking each step means she's performing the walk throughs.

Learn more about computer on:

https://brainly.com/question/24540334


Related Questions

What is congnitive overload

Answers

Explanation:

is a situation where the teacher gives too much information or too much many tasks to Learners simmultaneously , resulting in the learner being unable to process this information

Answer:

Cognitive loadLanguageWatchEditIn cognitive psychology, cognitive load refers to the used amount of working memory resources. There are three types of cognitive load: intrinsic cognitive load is the effort associated with a specific topic; extraneous cognitive load refers to the way information or tasks are presented to a learner; and germane cognitive load refers to the work put into creating a permanent store of knowledge (a schema).Cognitive load theory was developed in the late 1980s out of a study of problem solving by John Sweller.[1] Sweller argued that instructional design can be used to reduce cognitive load in learners. Much later, other researchers developed a way to measure perceived mental effort which is indicative of cognitive load.[2][3] Task-invoked pupillary response is a reliable and sensitive measurement of cognitive load that is directly related to working memory.[4] Information may only be stored in long term memory after first being attended to, and processed by, working memory. Working memory, however, is extremely limited in both capacity and duration. These limitations will, under some conditions, impede learning. Heavy cognitive load can have negative effects on task completion, and it is important to note that the experience of cognitive load is not the same in everyone. The elderly, students, and children experience different, and more often higher, amounts of cognitive load.The fundamental tenet of cognitive load theory is that the quality of instructional design will be raised if greater consideration is given to the role and limitations of working memory. With increased distractions, particularly from cell phone use, students are more prone to experiencing high cognitive load which can reduce academic success.[5]

Explanation:

Hope it helps ^-^

#CarryOnLearning

how you plan to deal with stress?

Answers

I plan to deal with stress by distracting my self in what I do with my daily life. One way to deal with stress is by listening to music or exercising. Both of these are distractions and help keep things off your mind.

If an audio signal is to be coded, either for compression or for digital transmission, it must undergo some form of quantization. Most often, a general technique known as vector quantization is employed for this task, but this technique must be tailored to the specific application so it will not be addressed here. In this assignment, we will observe the effect of uniformly quantizing the samples of two audio signals.
a) Record your voice for 4 seconds and play it again using predefined MATLAB audio functions.
b) Use your Uquant function to quantize each of these signals to 7, 4, 2 and 1 bits/sample.
c) Listen to the original and quantized signals and answer the following questions using the comments in the same MATLAB file:
1- For each signal, describe the change in quality as the number of b/sample is reduced?
2- For each signal, is there a point at which the signal quality deteriorates drastically?
3- At what point (if any) does it become incomprehensible?
4- Which signal's quality deteriorates faster as the number of levels decreases?
5. Do you think 4 b/sample is acceptable for telephone systems? ... 2 b/sample?
d) Use subplot to plot in the same figure, the four quantized speech signals over the index range 7201:7400.

Answers

Answer:

bakakkallalalnabzjs d bannn my account pls

Which of the following describes an iteration in a computer program?

Answers

Answer:

a set of instructions that can be run multiple times throughout a program

Explanation:

Select statements about Multiprocessors that are FALSE. a. Asymmetric multiprocessors are a popular form of tightly coupled architecture b. Symmetric multiprocessors are a popular form of tightly coupled architecture c. Tightly coupled multiprocessors share a single centralized memory, which requires an operating system to synchronize processes carefully to ensure protection d. Loosely coupled multiprocessors have a physically distributed memory and are also known as distributed systems

Answers

Answer:

The statement about Multiprocessors that is FALSE is:

a. Asymmetric multiprocessors are a popular form of tightly coupled architecture

Explanation:

Symmetric multiprocessors house two or more identical processors sharing a single main memory.  The multiprocessors are tightly coupled, and all of them can access all the connected devices without any preferential treatment of one over the others.  This is unlike asymmetric multiprocessors that do not share a single main memory.   Instead, they have distributed memories.

Suppose a class Car and its subclass Honda both have a method called speed as part of the class definition. rentalH refers to an object of the type Honda and the following statements are found in the code: rentalh.cost(); super.speed(); what will the first statement do?
A. Nothing will be called since the code will not compile as a result of multiple definitions of speed.
B. The cost method in Car will be called.
C. The cost method in Honda will be called.
D. Overloading will be used to determine which cost method to use.

Answers

Answer:

C. The cost method in Honda will be called.

Explanation:

The first statement will cause the cost method in Honda to be called. This is because rentalh is a object of the subclass Honda. Therefore, any method that is called using this object variable will target the elements within the Honda subclass. In this case, the cost() method is being called using the rentalh variable which will look for the cost() method within the scope of the Honda subclass. In order to target the parent class Car it would need to be called using the super variable as in statement 2.

Question # 18
Dropdown
A(n)
is the tool that will help you the most when developing the content you will use in your presentation.

Answers

Your answer is outline.

An outline is the tool that will help you the most when developing the content you will use in your presentation.

What is presentation?

A presentation is a method of communicating information from a speaker to an audience.

Presentations are usually demonstrations, introductions, lectures, or speeches intended to inform, persuade, inspire, motivate, build goodwill, or introduce a new idea/product.

An outline is a list of the main topics and subtopics that you intend to cover in your presentation in a hierarchical order.

It can assist you in ensuring that your ideas flow logically and that no important points are overlooked.

A storyboard, on the other hand, is a visual representation of your presentation that shows the order of your slides, the images or videos you intend to use, and the text that will go with them.

Thus, the answer is outline.

For more details regarding presentation, visit:

https://brainly.com/question/938745

#SPJ7

What is a
a program​

Answers

Answer:

-a collection of related measures or activities aimed at achieving a specific long-term goal.

-a set of pre-programmed software instructions for controlling the operation of a computer or other machine

-provide (a computer or other machine) with pre-programmed instructions for completing a task automatically

-Organize according to a schedule or plan.

Explanation:

Answer:

A program is an set of instructions given by a computer to perform particular task

Write a program that receives a filename as user input. The file is structured as multiple lines containing numbers separated by a single space. For example, this would be an acceptable file:

Answers

Answer:

The solution in Python is as follows:

filename = input("File: ")

fll = open(filename, "r")

for line in fll:

for i in line.split():

 print(i,end='\t')

print()

Explanation:

The complete question implies that the program reads a file and displays the file content in a structured way (tabs or spaces)

The explanation is as follows:

This gets input for the file name

filename = input("File: ")

This opens the file for read operation

fll = open(filename, "r")

This iterates through the lines of the file

for line in fll:

This iterates through each line (splitted by space)

for i in line.split():

This prints the current element followed by a tab

 print(i,end='\t')

This starts printing on another line

print()

g Write a function named find_min that takes two numbers as arguments and returns the minimum of the two. (Behavior is not specified for which to return, if they are even -- we won't test that case.) For example: Given 2 and 4, the function returns 2 as the minimum.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

void find_min(int x,int y)//defining a method find_min that takes two parameters

{

   if(x<y)//use if to check x less than y

   {

       cout<<x;//print value x

   }

   else//else block

   {

       cout<<y;//print value y

   }

}

int main()//main method

{

   int x,y;//defining integer variable

   cout<<"Enter first number: ";//print message

   cin>>x;//input value

   cout<<"Enter second number: ";//print message

   cin>>y;//input value

   find_min(x,y);//calling method

   return 0;

}

Output:

Enter first number: 4  

Enter second number: 2  

2

Explanation:

In this code, a method "find_min" that takes two integer variable "x,y" in its parameters and use if block to check its value and print is value.

In the main method, we declared two integer variable "x,y" that takes value from user-end, and pass the value into the method that prints its calculated value.

Implement a class named MyArrayList that extends class the java.util. ArrayList. The class MyArrayList overrides the add(obj) method in the following way: it adds obj into the list if the object does not occur in the list or it occurs in the list only once; otherwise, if the object occurs in the list more than once, then the method does nothing.

Answers

Answer:

import java.util.ArrayList;

import java.util.Collections;

public class MyArrayList<T> extends ArrayList<T> {

 public boolean add(T obj) {

   if (Collections.frequency(this, obj) < 2) {

     return super.add(obj);

   }

   return false;

 }

}

Explanation:

According to the requirement, an element with the same value can occur at most twice in the list.

The Collections.frequency utility is useful to count the occurrances.

Sure, here's an implementation of the `MyArrayList` class that extends `java.util.ArrayList` and overrides the `add` method as described:

```java

import java.util.ArrayList;

import java.util.HashMap;

import java.util.Map;

public class MyArrayList<E> extends ArrayList<E> {

   "ATTHERATE"Override

   public boolean add(E obj) {

       // Count occurrences of each element in the list

       Map<E, Integer> countMap = new HashMap<>();

       for (E element : this) {

           countMap.put(element, countMap.getOrDefault(element, 0) + 1);

       }

       // Check if obj occurs in the list only once or not at all

       if (!countMap.containsKey(obj) || countMap.get(obj) == 1) {

           return super.add(obj);

       }

       // If obj occurs more than once, do nothing

       return false;

   }

}

```

In this implementation, the `add` method first counts the occurrences of each element in the list using a `HashMap`.

Then, it checks whether the given object `obj` occurs only once or not at all in the list. If so, it adds the object to the list using the `super.add(obj)` call.

If `obj` occurs more than once, the method does nothing by returning `false`. This way, the `MyArrayList` class ensures that duplicates are added only once, or not at all, as required.

Know more about java:

https://brainly.com/question/12978370

#SPJ5

What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?

Answers

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

Precipitation patterns in gulf Mexico

Answers

Is there a diagram for what your asking ?

1 convert (101011)2 ( )10 ? convert(596)10= ( )16 ? convert( 101011101)2 ( )16 ? convert(37)10= ( )2 ?​

Answers

Question:

(a) convert (101011)₂ = ( )₁₀ ?

(b) convert(596)₁₀= ( )₁₆ ?

(c) convert( 101011101)₂ = ( )₁₆ ?

(d) convert(37)₁₀= ( )₂ ?​

Answer:

(a) (101011)₂ = ( 43)₁₀

(b) (596)₁₀= ( 254)₁₆

(c) ( 101011101)₂ = ( 15D)₁₆

(d) (37)₁₀= ( 100101)₂

Explanation:

(a) convert (101011)₂ = ( )₁₀

This means that (101011)₂ be converted to base 10 (decimal).

To convert from binary to decimal, find the sum of the binary digits times their power of 2. i.e

(101011)₂ = 1 x 2⁵ + 0 x 2⁴ + 1 x 2³ + 0 x 2² + 1 x 2¹ + 1 x 2⁰

(101011)₂ = 1 x 32 + 0 x 16 + 1 x 8 + 0 x 4 + 1 x 2 + 1 x 1

(101011)₂ = 32 + 0 + 8 + 0 + 2 + 1

(101011)₂ = 43₁₀

Therefore, (101011)₂ = ( 43)₁₀

(b) convert(596)₁₀= ( )₁₆

This means that (596)₁₀ be converted to base 16 (hexadecimal).

To convert from decimal to hexadecimal,

i. start by dividing the decimal number by 16 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 16 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

16 | 596

16 | 37 r 4

16 | 2 r 5

    | 0 r 2

Now combine the remainders starting from the bottom up. i.e

254₁₆

Therefore, (596)₁₀= ( 254)₁₆

(c) convert ( 101011101)₂ = ( )₁₆

This means that (101011101)₂ be converted to base 16 (hexadecimal).

To convert from binary to hexadecimal,

i. starting from the rightmost bit, group the binary digits into a group of 4 bits as follows

101011101 => 1   0101    1101

ii. the group that does not contain 4 bits is padded with 0s

101011101 => 0001   0101    1101

iii. using the hexadecimal table, convert each group to hexadecimal as follows.

0001 = 1

0101 = 5

1101 = D

iv. combine the result

15D

Therefore, ( 101011101)₂ = ( 15D)₁₆

(d)  convert(37)₁₀= ( )₂

This means that (37)₁₀ be converted to base 2 (binary).

To convert from decimal to binary,

i. start by dividing the decimal number by 2 taking note of the result and the remainder.

ii. divide the result obtained in (i) by 2 and take note of the new result and the remainder.

iii. repeat steps i and ii until the result is 0.

iv. the result is a combination of the remainders starting from the last.

2 | 37

2 | 18 r 1

2 | 9 r 0

2 | 4 r 1

2 | 2 r 0

2 | 1 r 0

  | 0 r 1

Now combine the remainders starting from the bottom up. i.e

100101₂

Therefore, (37)₁₀= ( 100101)₂

Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Explain why these tips are useful.

Answers

Answer:

1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons

2. Do not share your passwords because people can hack into your things

3. Don't make guessable passwords such as Cookies, ILovePizza, Money

1. Never give out your address, phone number, school name, etc.
This can lead to so many bad things. To protect yourself and others around you, don’t share your personal information to people you don’t know or trust.

2. Don’t add people on social media that you don’t know. I know a lot of people have public accounts and I’m not saying thats bad, but I am saying that you need to be careful on who’s adding you. There are a lot of creepy people out there.

3. Never open links people send you. If someone sends you a link online, it’s best to not open it. This opens up a whole new world for creeps to mess with you. They can track you, give you a virus or viruses. Never open random links that random people send you.

list with ecamples five important applications areas of computer today​

Answers

Answer:

Banking

Education

Business

Engineering and Architectural designs

Health

Explanation:

Banking : Shifting from the manual method of having to input information into hard book ledgers. Data and payment information can now be stored on computers. This may be used to prevent information duplication, forecasting and efficient payment purposes.

Education : With the use of computers today, students can now take computer based tests which are not only easily accessible and curtails geographical issues, they are also faster.

Business : With computers, businesses can now manage and their store customer information, inventory management and sales tracking.

Engineering and Architectural designs : With computers, thesw fields can now boast of computer aided designs which allows experts produce both 2 and 3 - dimensional prototype of equipments, buildings, building plans or other engineering structures.

Health : Adequate health record, patient appointment, digitally monitored pulse rate are some of the uses of computers in medicine.

What most defines a community in the digital age?

Answers

The information age of people texting talking on a cellular device and browising the internet

3. Why is human resource plan made​

Answers

Answer: See explanation

Explanation:

Human Resource Planning refers to the process whereby the future human resource requirements of an organization is predicted and how the current human resources that the organization has can be used to fulfill the goals.

Human resources planning is made as it's useful helping an organization meet its future demands by supplying the organization with the appropriate people.

Human resource planning also allows organizations plan ahead in order to have a steady supply of effective and skilled employees. It also brings about efficient utilization of resources. Lastly, it leads to better productivity and organizational goals will be achieved.

write a program to display your name, age and address in c programming​

Answers

Answer:

The program in C is as follows:

#include <stdio.h>

int main(){

   char name[] = "Mr. Royal";

   int age = 20;

   char address[] = "Lagos, Nigeria";

   printf("Your name is %s.\n", name);

   printf("You are %d years old\n", age);

   printf("Your address is %s.", address);

   return 0;

}

Explanation:

This initializes the name

  char name[] = "Mr. Royal";

This initializes the age

   int age = 20;

This initializes the address

   char address[] = "Lagos, Nigeria";

This prints the name

   printf("Your name is %s.\n", name);

This prints the age

  printf("You are %d years old\n", age);

This prints the address

  printf("Your address is %s.", address);

Change the necessary details to yours

What is a word processing program? Give examples of word processing programs.

Answers

Answer:

A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.

What protects your computer so that it doesn’t get a computer virus?

Internet Browser

Antivirus Software

Keyboard Protector

My Teacher

Answers

Answer:

Antivirus Software

Explanation:

I believe Antivirus Software.

Sorry if I am wrong.

Answer:

Antivirus Software

Explanation:

Antivirus scans the incoming files or code that has been passed through your network traffic. Companies who build these softwares maintain a database of viruses that are already known. That database teaches the antivirus to remove, flag or quarantine any viruses in your computer.

What blockchain implementation resulted from bitcoin’s rejection of a recommendation to enhance its scripting language support? Ethereum Hyperledger Fabric Multichain IOTA

Answers

Ethereum is the correct answer.

HELP NOW PLS now now now

Answers

Answer:

6.enable data to pass between computers in a network to aid communication between users. As a network engineer, you'll have responsibility for setting up, developing and maintaining computer networks within an organisation or between organisations.

7.Sony

At times, what seems to be an effective value network can also be vulnerable to quickly losing effectiveness. At one time, Sony Corporation set up a value network designed to have a "one-stop" gaming experience for its customers. From 2003 to 2008, Sony designed an all-encompassing gaming portal. However, the network was disrupted when computer hackers began breaking into the system and retrieving sensitive banking data from the network users. As a result, the effectiveness of the network was severely compromised.

Explanation:

A) Write "T" for true statement and "F" for false statement.

ii) Programming in machine level language is very easy.
iii) In Adobe Photoshop, Rectangle tool is used to draw rectangle shape​

Answers

Answer:

ii. False

iii. True

Explanation:

Machine and assembly are referred to as a low level programming language used in writing software programs or applications with respect to computer hardware and architecture. Machine language is generally written in 0s and 1s, and as such are cryptic in nature, making them unreadable by humans but easily understandable to computers.

In view of the above, we can deduce that programming in machine level language is very difficult for humans.

Adobe Photoshop is a proprietary software application designed and developed by Adobe inc. for both Windows and MacOS operating system. It is a raster graphics editor that's typically used for imaging and graphics design. It comprises of various shape tools such as ellipse, line, polygon, triangle, custom shape and rectangle.

Generally, the Rectangle tool is used to draw rectangle shape (vector and pixel-based)​ in Adobe Photoshop.

What tasks do date entry macros commonly perform?

Answers

Answer:

set a default date

Explanation:

Date entry macros are used to seta  default date.

Date macros can be used to  create custom date formats.

Produce a program using a loop that requests for 8 floating point numbers from a user.once provided the program should calculate the average of all numbers that are less than 10.5

Answers

Answer:

The program in Python is as follows:

total = 0

count = 0

for i in range(8):

   num = float(input())

   if num < 10.5:

       total+=num

       count+=1

print("Average: ",total/count)

Explanation:

This initializes the total to 0

total = 0

This initializes the count to 0

count = 0

This loop is executed 8 times

for i in range(8):

This request for float number

   num = float(input())

If input is less than 10.5

   if num < 10.5:

The sum is taken

       total+=num

And count is incremented by 1

       count+=1

The loop ends here

This calculates and prints the average

print("Average: ",total/count)

UNIX inodes are an example of an indexed file allocation scheme. What levels of indexing were they designed to support. A. Direct B. Single indirect C. Double indirect D. Triple indirect E. All of the above are supported by UNIX inodes.

Answers

Answer: E. All of the above are supported by UNIX inodes

Explanation:

An inode refers to the data structure that's in the UNIX operating systems which consists of vital information that has to do with the files that's within a file system.

It should be niteec that when there's creation of a file system in UNIX, then a set amount of inodes will be created too.

The levels of indexing that the UNIX inodes were designed to support include the direct, single indirect, double indirect and the triple indirect. Therefore, the correct option is E.

A _____ virus uses the language of an application that records a sequence of keystrokes and instructions in an application, such as word processing or spreadsheet, to hide virus code.

Answers

Answer: macro virus

Explanation:

The virus that uses virus uses the language of an application which is vital in recording the sequence of the keystrokes and the instructions in an application, like spreadsheet or the word processing in order to hide virus code is the macro virus.

A macro virus is simply a computer virus which is written in same macro language that is being used for software programs. When a software application is being infected by the macro virus, it leads to a sequence of actions which automatically start when the application is being opened.

What tells the hardware what to do and how to do it?

Central Processing Unit (CPU)

Software

Hardware

Hard Drive (HDD)

Answers

Answer:

Software

Explanation:

Software directs a set of instructions to computer hardware and tell them what to do and how to do it.

binary calculation of 1110÷101​

Answers

10.90 not sure tho. POWKSKS
10.99009900990099





Would be the answer
Other Questions
y is inversely proportional to x.When =9, y = 8.Find y when x= 6. Help me PLEASEEEEEEEEEEEEE (SOMEONE HELP ME PLEASE AND NO LINKS!!)What is the area of the pentagon shown below? Comrades," he said, "I trust that every animal here appreciates the sacrifice that Comrade Napoleon has made in taking this extra labour upon himself. Do not imagine, comrades, that leadership is a pleasure! On the contrary, it is a deep and heavy responsibility. No one believes more firmly than Comrade Napoleon that all animals are equal. He would be only too happy to let you make your decisions for yourselves. But sometimes you might make the wrong decisions, comrades, and then where should we be? Suppose you had decided to follow Snowball, with his moonshine of windmillsSnowball, who, as we now know, was no better than a criminal?""He fought bravely at the Battle of the Cowshed," said somebody.In the second paragraph, which word best shows the distrust the rest of the pigs placed in Snowball?awrongbsupposecwindmillsdmoonshineThe correct answer isn't C! What is the value of In e? Factoriz 5wp+15wp+20wr During year 8, Clark Company manufactured equipment for its own use at a total cost of $2,400,000. The project required the entire year to complete and all costs were incurred uniformly throughout the year. At the beginning of the period, Clark was able to borrow $1,500,000 at 6% specifically for the purchase of materials and the manufacture of the equipment. The entire debt, with interest was repaid on December 31, year 8, replaced with a long-term loan. Throughout year 8, Clark Company had additional debt of $1,000,000 with a weighted average interest rate of 7%. If Clark Company capitalizes the maximum amount of interest allowable under GAAP, how much will Clark report as interest expense in year 8 what made the caravel a good ship for exploration "In the brush houses by the shore Kino's neighbors sat long over their breakfasts, and they spoke of what they would do ifthey had found the pearl. And one man said that he would give it as a present to the Holy Father in Rome. Another said thathe would buy Masses for the souls of his family for a thousand years. Another thought he might take the money anddistribute it among the poor of La Paz; and a fourth thought of all the good things one could do with the money from thepearl, of all the charities, benefits, of all the rescues one could perform if one had money. All of the neighbors hoped thatsudden wealth would not turn Kino's head, would not make a rich man of him, would not graft onto him the evil limbs ofgreed and hatred and coldness."What does this conversation between the townspeople reveal about society? What theme is this conversation hinting at? health education has to be free from fatal diseases . justify this statement with logic In a situation where an individual consumes too much of a nutrient to the point of toxicity, how long would it take for the effects to be reversed? Please provide an example of a toxicity disease with long and short-term effects. Write the equation of a circle with radius 9 and center (6, 4) in standard form. Concepts: What key concepts or ideas do you think are important and worth holding on to from the text? Can someone help me with this? (poder) recomendarme el mejor plato de este"Ustedrestaurante?""Por supuesto, Seor. Le recomiendo la paella. A usted le(gustar) la paella vegetariana o la de mariscos?" What is the 2nd term of the linear sequence below? 5 , 8 , 11 , 14 , 17 , . . . 10 mi7 mi7 miI need the volume for Could someone please help me with this? Show all your work & I would mark you Brainliest:) What type of man did Roy expect Dana's father to be are pigs able to fly if not please explain why.