________ are created by combining and customizing components from different online software applications.

Answers

Answer 1

Answer:

Mashup are created by combining and customizing components form different online software applications.


Related Questions

Write a program to store the elements (30,3,8,7,5) and display their location

Answers

Answer:

why did you delete my answeR?

30, 3, 8, 7, 5

Name three reasons why computers use both integers and real numbers

Answers

Answer:

Precision, readability, and appropriateness

This project was used to drive the VR Robot to number 25 on the Number Grid
*
Map, but it does not work correctly. What is the error?
.
The VR Robot should drive in reverse first
Wait until position Yin millimeters (mm) should be GREATER than 500.no LESS
than
Wait una position Xin millimeters() should be less than 100, no CREATER
than
O
The Stop driving blocks are not needed

Answers

Answer:

B Wait until position y in millimeter should be greater than 500 at least im guessing because you didnt add what the map looked like, making my job MUCH harder

Explanation:

What does the “mystery” function do?

Answers

Answer:

Find the product of prime number between 1and8

Answer:

function mystery() {

while (noBallsPresent()) {

move();

}

}

Explanation:

Karel moves until it is on a ball.

how to maintain large processors

Answers

avoiding turning it off with the power switch or power button use the os to turn it off

hello everyone I need some help with what a footer is on a web page

Answers

Answer:

A website's footer is an area located at the bottom of every page on a website, below the main body content

Explanation:

By including a footer, you make it easy for site visitors to keep exploring without forcing them to scroll back up.

Anyone know why my pc won’t start up I upgraded my ram and everything seems fine

Answers

Answer:

RAM Slots

Explanation:

If you upgraded RAM then check if RAM is in correct slots according to the Motherboard Manual, i had the same issue when i replaced my RAM.

Given the user inputs, complete a program that does the following tasks: Define a set, fruits, containing the user inputs: my_fruit1, my_fruit2, and my_fruit3. Add the user inputs, your_fruit1 and your_fruit2, to fruits. Add the user input, their_fruit, to fruits. Add your_fruit1 to fruits. Remove my_fruit1 from fruits. Observe the output of each print statement carefully to understand what was done by each task of the program. Note: For testing purposes, sets are printed using sorted() for comparison, as in the book's examples. Ex: If the input is:

Answers

The program is an illustration of sets in a python program

What are sets?

Sets are variables that hold multiple values in a program

The main program

The program written in Python, where comments are used to explain each line is as follows:

my_fruit1 = input()

my_fruit2 = input()

my_fruit3 = input()

your_fruit1 = input()

your_fruit2 = input()

their_fruit = input()

# 1. TODO: Define a set, fruits, containing my_fruit1, my_fruit2, and my_fruit3

fruits = {my_fruit1, my_fruit2, my_fruit3}

print(sorted(fruits))

# 2. TODO: Add your_fruit1 and your_fruit2 to fruits

fruits.add(your_fruit1)

fruits.add(your_fruit2)

print(sorted(fruits))

# 3. TODO: Add their_fruit to fruits

fruits.add(their_fruit)

print(sorted(fruits))

# 4. TODO: Add your_fruit1 to fruits

fruits.add(your_fruit1)

print(sorted(fruits))

# 5. TODO: Remove my_fruit1 from fruits

fruits.remove(my_fruit1)

print(sorted(fruits))

Read more about python programs at:

https://brainly.com/question/26497128

Create a python program that will input their name and their age. It will show an output "Hi, {name} ! How are you? I know you are {age} old."

I WILL MARK YOU AS BRAINLIEST​

Answers

Answer:

age = 10

name = Cynthia

make an f string so the variables appear in the string. There are other ways to do this but I prefer f strings instead of using string concatenation. It causes problems adding 2 strings together most of the time.

print(f'Hi, {name} ! How are you? I know you are {age} old.')

Which formula is used to measure accuracy?

Answers

The accuracy formula provides accuracy as a difference of error rate from 100%. To find accuracy we first need to calculate the error rate. And the error rate is the percentage value of the difference of the observed and the actual value, divided by the actual value

what is computer/why it is called data processor

Answers

Answer:

Computer is known as data processor because it processes the data. First the data is inserted in the computer through input devices. After that, computer translate the data in its own language and then the computer takes action according to the instructions given to the computer

What is an object? Give five examples of real world objects.

Answers

Answer:

things u can touch

Explanation:

paper

pen

eraser

table, metal

hello everyone can help me give all the answer​

Answers

Answer:

1. were

2. were

3 was

4 was

5 were

1 wasnt

2 werent

3werent

4 wasnt

5 werent

were you at work?

was it in the garden?

were they worried?

was lucy present?

were his friends late?

1 they were

2 it was

3 he wasn't

4 I was

5 they weren't

Explanation:

what is the numeric value of 19%(2+3) as evulated by Java

Answers

Answer:

4

Explanation:

java does parenthesis first then mod so it will do 2+3 which is 5 then 19 mod 5 which is 4(5 goes in evenly 3 times for a total of 15. Mod is the remainder number meaning that 19-15 = 4).

Why do we use for loops with arrays?
Group of answer choices

For loops let us access one specific element of an array.

Lets us quickly process contents of the array.

To store one piece of data at a time.

For loops let Python handle the values as strings not numbers.

Answers

B. Let’s us quickly process contents of the array

Write a program that does the following:

You will make a program that registers the maximum TEMPERATURE that is registered during the WEEK (that is, every day, that is, 7 days).

You must at the end show/print the number of temperatures that were HOT (May or equal to 25 degrees) and those that were COLD (less than or equal to 10 degrees)

The program MUST have DO WHILE and IF.






IN JAVA SCRIPT AND PLEASE SEND THE CODE IN THE COMMENTS

Answers

Answer:

Mean maximum temperature is measured by taking maximum temperatures and add them up and divide again by as many as the mean highest temperatures you added up. One measures the mean of only highest temperatures and the other the average of all high temperatures.

Explanation:

A web application's code prevents the output of any type of information when an error occurs during a request. The development team cited security reasons as to why they developed the application in this way. What sort of security issues did the team have concerns about in this case?

Answers

Answer:

Revealing database server configuration

Explanation:

The sort of security issues did the team have concerns about in this case is Revealing database server configuration.

What is revealing database server configuration?

A. Revealing database server configuration is known to be a kind of web application's code that hinders the output of any kind of information only if an error is taken place during a request.

Therefore, based on the scenario above, The sort of security issues did the team have concerns about in this case is Revealing database server configuration.

Learn more about  application's code from

https://brainly.com/question/23275071

#SPJ2

how to write a code that determines if a number is odd or even?
the code should start with a variable declaration

Answers

Answer:

//code in c++

#include <iostream>

using  namespace std;

int main() {

   int a;

   cin>>a;

   if(a%2==0){

       cout<<"Even number";

   }

   else{

       cout<<"Odd number";

   }

return 0;

Explanation:

a. Modify the FitnessTracker class that includes data fields for a fitness activity, the number of minutes spent participating, and the date. The class includes methods to get each field. In addition, create a default constructor that automatically sets the activity to running, the minutes to 0, and the date to January 1 of the current year. Create an application that demonstrates each method works correctly.


b. Create an additional overloaded constructor for the FitnessTracker class you created in Exercise 3a. This constructor receives parameters for each of the data fields and assigns them appropriately. Add any needed statements to the TestFitnessTracker.java application to ensure that the overloaded constructor works correctly, save it, and then test it.


An example of what it should look like:

running 0 minutes on 2021-01-01

bicycling 35 minutes on 2020-08-20


What's done:

import java.time.*;

public class FitnessTracker {

String activity;

int minutes;

LocalDate date;

// constructor for 3a

public FitnessTracker() {

}

// constructor for 3b

public FitnessTracker(String a, int m, LocalDate d) {

}

public String getActivity() {

}

public int getMinutes() {

}

public LocalDate getDate() {

}

}

Answers

Answer:

It keeps saying servers fully loaded

Explanation:

_____ is the use of large amounts of data, organized and presented to identify patterns and trends. Continuous Improvement Continuous Improvement Usability testing Usability testing Analytics Analytics System implementation

Answers

Analytics is the use of large amounts of data, organized and presented to identify patterns and trends.

What is Data?

This is defined as the raw form of information which has to undergo processing and analysis.

Analytics involves the use of data which aren't easily detected in ensuring that patterns and trends are identified through their interpretation.This therefore makes it the most appropriate choice.

Read more about Analytics here https://brainly.com/question/25819900

Answer:

Analytics

Explanation:

got it right on edge

What are two things to consider when linking pages in your website? How are your decisions about absolute and relative URLs affect the reliability of your links?

Answers

The two (2) things to consider when linking webpages in your website include:

The names of the hyperlink.The proper use of anchor text.

What is a hyperlink?

A hyperlink can be defined as an element in a hypertext markup language (HTML) document such as a website, which provides a direct access or link to another HTML document, webpage, location, and image.

Basically, a hyperlink links to the same webpage in a hypertext markup language (HTML) document such as a website.

The things to consider when linking webpages.

In Web design, the two (2) things to consider when linking webpages in your website include:

The names of the hyperlink: it should be the same as the webpage name that is being linked to.The proper use of anchor text: it is more advisable to use anchor text rather than linked images.

An absolute URL contains all the information (protocol and domain name) that are needed to locate a resource while a relative URL can only locate a resource by using an absolute URL as a starting point because it doesn't contain any protocol.

In conclusion, an absolute URL helps to improve and enhance the reliability of your links because it contains the entire information that are needed to locate a resource.

Read more on absolute URL here: https://brainly.com/question/23338043

In other programming languages, the dictionary data structure is referred to as a(an)

Answers

Answer:

hash

Explanation:

it is called a hash, a map, or a hasmap

A dictionary is a data structure for storing items. Languages such as JavaScript refer to dictionaries as objects. They're all key-value stores.

A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like to know the operating system of a target device and scan for commonly used ports. Select the nmap commands that will be useful in this case. (Select all that apply.)

Answers

The Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

What is a penetration test?

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

Operating systemWeb softwareHost deviceNetwork

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

The Network Mapper (Nmap) commands.

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

nmap xxx.xxx.x.x -pnmap xxx.xxx.x.x -A

Read more on penetration test here: https://brainly.com/question/25813524

Determine the binary encoding for a system that uses two’s complement of the base-10
quantities negative six and six for a digital system where all binary numbers are represented by four bits, one where all numbers are represented by eight bits (one byte).

Answers

Answer:

4 bits:

6 = 0110

-6 = 1010

8 bits:

6 = 00000110

-6 = 11111010

Explanation:

2's complement is easier to implement, because it only has one representation of 0 and starts counting backwards from the highest number you can represent with the available bits.

e.g.,

7 = 0111

6 = 0110

5 = 0101

4 = 0100

3 = 0011

2 = 0010

1 = 0001

0 = 0000

-1 = 1111

-2 = 1110

-3 = 1101

-4 = 1100

-5 = 1011

-6 = 1010

For 4 bits:

-6 = 01106 = 1010

For 8 bits (1 byte):

-6 = 0000 + 0110 = 000001106 = 1111 + 1010 = 11111010

What is binary encoding?

Binary encoding can be defined as a standard technique that is designed and developed to convert data in plain text (source alphabets) to a form that is easily used by different operating systems (OS), especially through the use of a binary digit (bit) or two-symbol system.

The two’s complement of base-10.

In Computer programming, two's complement of base-10 is generally easier to implement because it has a single representation of 0 only.

Decimal      Two’s Complement      Decimal      Two’s Complement

    0                       0000                        0                        0000

    1                       1111 1111                       -1                      0000 0001

    2                      1111 1110                      -2                    0000 0010

    3                      1111 1101                      -3                    0000 0011

    4                      1111 1100                     -4                    0000 0100

    5                      1111 1011                      -5                    0000 0101

    6                      1111 1010                     -6                    0000 0110

    7                      1111 1001                     -7                    0000 0111

    8                      1111 1000                    -8                    0000 1000

For 4 bits:

-6 = 0110

6 = 1010

For 8 bits (1 byte):

-6 = 0000 + 0110 = 00000110

6 = 1111 + 1010 = 11111010

Read more on binary encoding here: https://brainly.com/question/5381889

Create a class RightTriangle which implements the API exactly as described in the following JavadocLinks to an external site..

Don't forget - you will need to use the Pythagorean theorem (Links to an external site.) to find the hypotenuse (and therefore the perimeter) of a right triangle. You can find the area of a right triangle by multiplying the base and height together, then dividing this product by 2.

Use the runner_RightTriangle file to test the methods in your class; do not add a main method to your RightTriangle class.

Hint 1 - Javadoc only shows public methods, variables and constructors. You will need to add some private member variables to your RightTriangle class to store the necessary information. Think carefully about what information actually needs to be stored and how this will need to be updated when methods change the state of a RightTriangle object.

Hint 2 - As in the previous lesson's exercise it's helpful to add your method/constructor headers and any dummy returns needed before implementing each one properly. This will allow you to test your code using the runner class as you go along.

This is the runner code:

import java.util.Scanner;

public class runner_RightTriangle{
public static void main(String[] args){
Scanner scan = new Scanner(System.in);
RightTriangle t = new RightTriangle();
String instruction = "";
while(!instruction.equals("q")){
System.out.println("Type the name of the method to test. Type c to construct a new triangle, q to quit.");
instruction = scan.nextLine();
if(instruction.equals("getArea")){
System.out.println(t.getArea());
}
else if(instruction.equals("getBase")){
System.out.println(t.getBase());
}
else if(instruction.equals("getHeight")){
System.out.println(t.getHeight());
}
else if(instruction.equals("getHypotenuse")){
System.out.println(t.getHypotenuse());
}

else if(instruction.equals("getPerimeter")){
System.out.println(t.getPerimeter());
}
else if(instruction.equals("toString")){
System.out.println(t);
}
else if(instruction.equals("setBase")){
System.out.println("Enter parameter value:");
double arg = scan.nextDouble();
t.setBase(arg);
scan.nextLine();
}
else if(instruction.equals("setHeight")){
System.out.println("Enter parameter value:");
double arg = scan.nextDouble();
t.setHeight(arg);
scan.nextLine();
}
else if(instruction.equals("equals")){
System.out.println("Enter base and height:");
double bs = scan.nextDouble();
double ht = scan.nextDouble();
RightTriangle tOther = new RightTriangle(bs, ht);
System.out.println(t.equals(tOther));
scan.nextLine();
}
else if(instruction.equals("c")){
System.out.println("Enter base and height:");
double bs = scan.nextDouble();
double ht = scan.nextDouble();
t = new RightTriangle(bs, ht);
scan.nextLine();
}
else if(!instruction.equals("q")){
System.out.println("Not recognized.");
}
}
}
}

My code so far:

class RightTriangle{
private double base;
private double height;
public RightTriangle(){
base = 1.0;
height = 1.0;
}
public RightTriangle(double ds, double ht){
base=ds;
height=ht;
}
public boolean equals​(RightTriangle other){
if(base==other.base && height==other.height ){
return true;
}
else
{
return false;
}
}
public double getArea()
{
return (base*height)/2;
}
public double getBase(){
return base;
}
public double getHeight()
{
return height;
}
public double getHypotenuse()
{
return Math.sqrt((base*base)+(height*height));
}
public double getPerimeter()
{
return base+height+Math.sqrt((base*base)+(height*height));
}
void setBase (double bs)
{
if(bs==0){
System.exit(0);
}
else{
base=bs;
}
}
public void setHeight(double ht){
if(ht==0){
System.exit(0);
}
height=ht;
}
public java.lang.String toString()
{
return "base: "+base+" hegiht: "+height+" hypothesis: "+ Math.sqrt((base*base)+(height*height));
}

}

MY CODE SAYS THAT THE setHeight and setBase and toString METHODS ARE INCORRECT.

Answers

Answer:

I don't see anything. Its blank

Explanation:

how can one improve the quality of the search results when using internet services such as research methods

Answers

Answer:

Vary Your Search Engine. Use Specific Keywords.Simplify Your Search Terms. Use Quotation Marks. Remove Unhelpful Words. Refine Your Search Using Operators.Avoid Search Pitfalls.

Explanation:

Pick the correct statements on the 64-bit machine representation of numbers.

The relative error in any elementary arithmetic operation is bounded above by machine precision.
Most of the decimal numbers are concentrated around zero.
Division by small numbers in an iterative process is a potential source of instability.
There are as many numbers between 1 and 2 as there are between 3 and 4.
Machine precision epsilon is the smallest decimal number that could be represented on the computer.

Answers

Answer:Floating-point arithmetic is considered an esoteric subject by many people. This is rather surprising because floating-point is ubiquitous in computer systems. Almost every language has a floating-point datatype; computers from PCs to supercomputers have floating-point accelerators; most compilers will be called upon to compile floating-point algorithms from time to time; and virtually every operating system must respond to floating-point exceptions such as overflow. This paper presents a tutorial on those aspects of floating-point that have a direct impact on designers of computer systems. It begins with background on floating-point representation and rounding error, continues with a discussion of the IEEE floating-point standard, and concludes with numerous examples of how computer builders can better support floating-point.

Explanation:

Amazon Web Services (AWS) has several data centers which have multiple processors that perform computations.

a. True
b. False

Answers

There is several data centers associated with Amazon Web Services (AWS) and this contain multiple processors that perform computations.

What is a data center?

A data center serves as a building that house computer systems as well as associated components for data processing. These center helps in telecommunications and storage systems.

In Amazon Web Services, these data centers contains multiple processors which is been used in computations. The processor is usually sequence with their IDs.

Learn more about data center  at;

https://brainly.com/question/25605883

Which is an advantage of a computer network?
A. Networked computers can process data and run software faster than single computers.
B. Networks prevent unauthorized access to data and protect equipment.
C. Networked computers are less likely than single computers to suffer equipment failure.
D. Networks allow computers to connect quickly and to share data or equipment.

Answers

D. is the answer.............

convert 34.657 to binary and also 25.75 to binary

Answers

Answer:

34.657=100010.1010100000110001001 base two

25.75  =11001.11

Other Questions
How did the fair housing act (1968) affect the states and Congress? Each of 8 girls hasa button collection.Each girl has 8buttons in hercollection. Howmany total buttonsare there in the 8collections? The demand curve has what kind of slope? Predict what changes might occur if DNA is altered in a particular organism. At a horseback riding competition in the Olympics, each rider receives a score from 2 judgesscores. Maddy was one of the riders in the competition. If one judge awarded Maddy a scoreof 87, and Maddys final score was 84.5, what score did the other judge award Maddy? Convert from exponential form to logarithmic form: Question 1 options:log27(3)=3log3(3)=27log3(27)=327log3(27)=3Question 2 (1 point) Translate from Logarithmic Form to exponential form: log2(8)=3Question 2 options:23=832=882=328=3Question 3 (1 point) Solve for the missing info: log4 __ =3 s episode 12 of All of Us are Dead Season 1 the series ended, students made it to quarantine camp and experienced tragic loss. After four months, they are still hoping for a survivor. In your own point-of-view, what will happen in the next season? Present your argument and support it with possible and plausible evidence from season 1. Which set of ordered pairs is made up of points on the graph of the function below? y=-4x+3 A. (-1,7), (3,0), (1,-1), (-5,2) B. (7,-1), (3,0), (-1,1), (-5,2) C. (7,-1), (3,0), (1,-1), (2,-5) D. (-1,7), (0,3), (1,-1), (2,-5) A man presents to an ER with a large laceration sustained at a construction site 3 days before. The area around the laceration is erythematous, painful, and swollen. The erythema and swelling can be explained at a cellular level by all the following EXCEPTGroup of answer choicesmast cell degranulation and release of histamine.pro-inflammatory prostaglandins released.increased vasomotor tone (vasoconstriction) of the capillaries in the area.local reaction to acute phase reactants. A representative democracy is a government in which: Why do singers grab their crotch when they are singing. How did the Three-Fifths Compromise impact South Carolina? A) South Carolina was able to convince other southern states that slavery was wrong. B) South Carolina was able to keep the international slave trade going until the Civil War. C) South Carolina was able to acquire more seats in the House due to counting slaves in the population. D) South Carolina was able to acquire more seats in the Senate due to counting slaves in the population. Fill in the table using this function rule.y = 4x + 1HELP PLEASE NOW!!! no links plz The temperature in Chicago was reported as 2.5 degrees F below zero. The temperature in Detroit was reported as 1.5 degrees F above zero. The temperature in Chicago can be reported as:a) 2.5 degrees Fb) -2.5 degrees F What type of neurons are found in the postcentral gyrus?. When a part of the body becomes bigger than normal? On Dec. 4, 1998, sunrise was at 6:58 and sunset was at 4:12.The length of the daylight was:O A. 8 hr 15 minB. 9 hr 3 minO c. 9 hr 12 minOD. 9 hr 14 minE. 10 hr 15 minPLS HELP PLEASE HELP DO BOTH A AND B PARTS PLEASE :) The town of Eatonville has decided to replace all of the incandescent light bulbs in their public buildings with more energy-efficient compact fluorescent bulbs.Which information based on scientific research may have informed this decision?a. Incandescent bulbs waste less heat energy.b. Both types of bulbs produce the same amount of light energy.c. Compact fluorescent bulbs use less electrical energy and last longer.d. Compact fluorescent bulbs release more heat energy. To me, fitness meansMy level of fitness is important to me becauseMy attitudes about fitness are influenced by these peopleOther than physical education class, I am active in the following activities:In the past, the physical activities I enjoyed wereBecauseIn the past, the physical activities I did not enjoy wereBecauseCompared to when I was younger, I now participate in (circle one) more/ less/ the same number of activities because.Obstacles to my participation or factors that have changed my participation now areI think I can overcome these obstacles by