what is control structure write it's types​ .

Answers

Answer 1

Answer

Defination-:

A control statement is a statement and a statement whose execution its control.

Types-:

Selection StatementIteration StatementUnconditional branching Statement

Related Questions

Technical skills are also called soft skills.
Question 9 options:
True
False

Answers

The statement is false, technical skills are those that serve to perform a specific function and are also called hard skills.

Technical skills are skills that include knowledge in the mechanical, computer, mathematical or scientific area that will allow a good performance of specific tasks.

A person with technical or hard skills is able to apply specific methods, procedures and techniques in a specialized field.

Soft skills refers to the characteristics and personal competencies that show how a person copes with others, it is related to emotional intelligence.

Therefore, we can conclude that technical or hard skills are the practical knowledge necessary to perform specific tasks, while soft skills are those skills associated with the ability to interact effectively on a personal level.

Learn more about technical skills here: https://brainly.com/question/10976877

goal of any user-friendly game should be to create a good what for the player?
A. user experience (UX)
B. user-interface (UI)
C. user intuition (UIT)
D. user skill (US)

Answers

Answer:

A

Explanation:

The goal of user friendly game is to provide UX.

For example a user friendly game will have much different interface than professional CAD program.

Answer:

user friendly.

Explanation:

????????????helpppp please

Answers

Answer:

I lab u pre haha jok

ano ka gold

anyone please help me with his I keep on getting confused

Answers

Answer:

InDesign- Desktop publishing software

Illustrator- Enterprise software

DreamWeaver- Web development software

Photoshop- Graphic design software

Hope this helps!

You've just received an email message that indicates a new serious malicious code threat is spreading across the internet. The message contains detailed information about the threat, its source code, and the damage it can inflict. The message states that you can easily detect whether or not you have already been a victim of this threat by the presence of three files in the \Windows\System32 folder. As a countermeasure, the message suggests that you delete these three files from your system to prevent the code from spreading further.

Required:
Based on the email message, what are the next BEST actions to complete?

Answers

Answer:

The next BEST actions to complete could either be to call 911 or just drive somewhere further from your computer and where you live because the threat might come to your place, or it might already be in your place.

Explanation:

I
What is a Watermark?

Answers

it is a way to show your brand or logo on a video is photo
A watermark is a little way of showing your logo of something

Whats wrong with this and how do I fix it?

Answers

Answer:

this happened to me before.. there isn't anything wrong you just have to wait a little

Explanation:

Which phrase will be coded using the element in HTML?

Answers

Answer:

The <i> tag is often used to indicate a technical term, a phrase from another language, a thought, a ship name, etc. Use the <i> element only when there is not a more appropriate semantic element, such as: <em> (emphasized text) <strong> (important text)

Explanation:

brainliest please thank you :)#CARRYONLEARNINGCORRECT ME IF IM WRONG

which part lets you point to objects on your screen, click on them, and even move them?

Answers

Mouse lets you point to objects on your screen, click on them, and even move them.

A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically. Modern computers can perform generic sets of operations known as programs.

A computer mouse is a handheld hardware input device that controls a cursor in a GUI (graphical user interface) for pointing, moving and selecting text, icons, files, and folders on your computer.

Find out more on mouse at: https://brainly.com/question/22247989

outline how the appropriate features that may be used to ensure that the document is free of spelling and grammatically errors.​

Answers

Answer:

Answer

Since Sophie often makes a lot of

grammatical and spelling errors in her

document, it might be best for her to use

a feature available in Microsoft Word that

would help her better in understanding

what her mistakes are, which is

something that (D) Explain does.

Explain would tell Sophie which part of

her sentence is wrong, or what word

did she mistype, and what better way to

phrase a sentence to avoid fragmented

ones.

Which of these would be the best way to inform an employee that they are losing their job?
Group of answer choices

group email

face-to-face conversation

instant message

personal email

Answers

Answer:

Terminations are a sensitive subject.

Even if you have strong reasons for letting an employee go, sitting them down to explain they are out of a job can be an awkward conversation.  

Some employers might be tempted to fire an employee using an impersonal method ⁠— like a phone call, email, or text ⁠— just to avoid that discomfort. But that is a very bad idea. We strongly recommend that employers should only fire staff during a face-to-face termination meeting.

in addition to good design sense, what else do web designers need to be proficient in?

Answers

In addition to good design sense, web designers need to be proficient in front-end coding languages.

A web designer refers to an individual who is saddled with the responsibility of writing executable codes (instructions) for the design and development of a website, especially by using a hypertext markup language (HTML).

Generally, it is expected that all web designers a good design sense in website development. Additionally, web designers need to be proficient in front-end coding languages, so as to ensure the graphical display and user-interface (UI/UX) are attractive and properly rendered.

Some examples of front-end coding languages include:

CSSHTMLJavascriptReactJQuerryVue

Read more on web design here: https://brainly.com/question/8391970

what is the similarities between traditional and modernized presentation​

Answers

Answer:

“Traditional” refers to those societies or elements of societies that are small-scale, are derived from indigenous and often ancient cultural practices. “Modern” refers to those practices that relate to the industrial mode of production or the development of large-scale often colonial societies.

what is internet? short ans​

Answers

Answer:

The Internet is a big network that connects computers all over the world.

how many pages is 1500 words double spaced 12pt font?

Answers

Answer:

6 pages

Explanation:

To remove a specified number of characters from anywhere within a string, you should use the ____ method.

Answers

Answer:

remove

Explanation:

Match each type of Save option on the left with a function on the right.

Answers

Answer:

the above is correct

Explanation:

A healthcare crisis where millions of patient medication records were tampered with is an example of what type of breach?

A.
integrity breachc.

B.
codependency breach

C.
authentication breach

D.
AIC Triad breach

Answers

A healthcare crisis where millions of patient medication records were tampered with is an example of; A: Integrity Breach.

To answer this question, let us access each of the options;

A) Integrity breach; This is a breach that occurs when where there is an unauthorised or accidental alteration of the personal data of individuals or a group.

B) Codependency breach; This is not really a breach in this context as it happens when there is an imbalanced relationship between two or more people.

C) Authentication breach; This is a type of breach that is more common with a breach of passwords and login details.

D) AIC Triad breach; AIC is Availability, Integrity and confidentiality. So it combines Availabilty breach, integrity breach and confidentiality breach.

In this question, the patient medication records were tampered with which means that they were altered and from our definitions above, this is an example of integrity breach.

Read more about security breach at; https://brainly.com/question/15957125

WRITE A PROGRAM TO CALCULATE SIMPLE INTEREST

Instructions to do the program:-

The output format of the program should be as shown below:

P = 2000

R = 8

N = 4

Simple Interest = 640
pls help

Answers

The simple interset program is a sequential program, and does not require loops and conditions

The simple interset program in Python, where comments are used to explain each line is as follows:

#This gets input for the principal amount

P = int(input("P = "))

#This gets input for the rate

R = int(input("R = "))

#This gets input for the number of years

N = int(input("N = "))

#This calculates the simple interest

I = P * R * T * 0.01

#This prints the simple interest

print("Simple Interest =",I)

Read more about simple interest at:

https://brainly.com/question/2294792

Sampson runs his own online business, and much of his success depends on the reliability and accuracy of various online data. How does integrity help to ensure that Sampson can trust the online data he is using?

A.
Integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people.

B.
Integrity refers to a process that makes it impossible for anyone but Sampson to see the data that he is using.

C.
Integrity blocks all hackers from interfering with Sampson's data and what he does with it.

D.
Integrity allows Sampson to access and move data on an unsecured network.

Answers

Answer: because integrity takes steps to ensure Sampson's information cannot be altered or deleted by unauthorized people and that it stays intact, no matter where it goes

Explanation:

Discussion Topic:
Web maintenance plays a vital role in a website's development. It helps ensure
the online presence of any website by performing regular updates. Discuss the
benefits of web maintenance.

Need help can someone answer plz

Answers

Answer:

Prevents lagging

Explanation:

This prevents the website from being slow and upto shape so those who access it dont have difficulties

What is the first step when creating a 3-D range name?

Open the New Range window, and click 3-D.
Press the Shift key while selecting the new sheet .
Open the Name Manager, and click New.
Click a cell to insert the cell reference.

Answers

Answer:

Open the Name Manager, and click New.

Explanation:

Write any two uses of ruler in word program

Answers

Answer:

1.It is used for draw the table, making results and assignments etc.

2.It is used for lining

Explanation:

Hope it helps

#CARRYONLEARNING

where deep convolutional neural network is used in real life

Answers

Answer:

Business applications of Convolutional Neural Networks. Image Classification - Search Engines, Recommender Systems, Social Media. Face Recognition Applications of RNN is Social Media, Identification procedures, Surveillance. Legal, Banking, Insurance, Document digitization - Optical Character Recognition.

what is a saved link to a particular web page?​

Answers

Answer:

A bookmark

Explanation:

A bookmark is a saved link to a particular Web page. Microsoft Internet Explorer denotes bookmarks as “favourites.” Boolean operators Most search engines (e.g. Go.ogle) allow you to limit your search or make it more specific by using words such as “and”, “or” and “not”.

Michaela has been tracking the temperatures of the dirt, pond water, and air near her home for a science investigation. She is ready to analyze the data to prepare for her science report. Based on each application’s strengths and weaknesses, which one would be the best to choose for this task?

Answers

Answer:

The science of investigation

Explanation:

hope it help

What type of information is appropriate for headers and footers? Check all that apply.

Answers

Answer:

C,  E,F,G  are correct

Explanation:

Answer:

C,E,F,G  are correct.

Explanation:

2. Input a decimal number and test if it is not equal to 16.5.


3. If a number x, input from the keyboard is greater than 57, add 4 to x and print the

answer.


4. Input two numbers and find the average only if they are both less than 100.

Answers

Answer:

2:

decNum = float(input("Decimal number: "))

if decNum != 16.5:

   print("Does not equal")

elif decNum == 16.5:

   print("Equal")

else:

   pass

3:

if x > 57:

   x += 4

   print(x)

4:

numOne = int(input("Enter number: "))

numTwo = int(input("Enter number: "))

if numOne < 100 and numTwo < 100:

   yes = numOne + numTwo

   print(yes // 2)

else:

   pass

Explanation:

Please give me brainliest.

You can use the ____ method to search a string to determine whether it contains a specific sequence of characters.

Answers

Answer:

in

Explanation:

Not an explanation, but here's an example:

if "mouth" in "mouthwatering":

   print("It is.")

else:

   pass

Another example:

if "water" in "mouthwatering":

   print("Yes.")

else:

   pass

Which CPU characteristic when enabled, doubles the number
of instructions which can be processed at once?

Answers

Answer:

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions. The term has been used in the computer industry at least since the early 1960s. Traditionally, the term “CPU” refers to a processor, more specifically to its processing unit and control unit (CU), distinguishing these core elements of a computer from external components such as main memory and I/O circuitry.

The form, design and implementation of CPUs have changed over the course of their history, but their fundamental operation remains almost unchanged. Principal components of a CPU include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU, registers and other components.

Most modern CPUs are microprocessors, meaning they are contained on a single integrated circuit (IC) chip. An IC that contains a CPU may also contain memory, peripheral interfaces, and other components of a computer; such integrated devices are variously calledmicrocontrollers or systems on a chip (SoC). Some computers employ a multi-core processor, which is a single chip containing two or more CPUs called “cores”; in that context, single chips are sometimes referred to as “sockets”. Array processors or vector processors have multiple processors that operate in parallel, with no unit considered central.

Other Questions
I need help with this please 42. She .. the whole day long. (a) has been working (b) works (c) had worked (d) worked 1. What is a myth?a) A true story of gods from long agob) A story that often tells a lesson and explains the creation of somethingc) A fictional story based on real people from history.d) A story with taking animals that tells a lesson. The point S(0,2) is translated 4 units left. What are the coordinates of the resulting point, S'? Overall, which phrase best describes the tone of this passage?ROMEOO, she doth teach the torches to burn bright!It seems she hangs upon the cheek of nightAs a rich jewel in an Ethiop's ear-Beauty too rich for use, for Earth too dear.So shows a snowy dove trooping with crowsAs yonder lady o'er her fellows shows.The measure done, I'll watch her place of standAnd, touching hers, make blessd my rude hand.Did my heart love till now? Forswear it, sight,For I ne'er saw true beauty till this night. A model cell with damaged DNA was created to explain the importance of checkpoints in a cell cycle. The G2 checkpoint accidentally failed to work during experimentation. What do you think is the likely consequence of this failure?. Do you think it is worth giving up some of the kinds of freedoms included in the Bill ofRights if it can help a country pull more people out of poverty? Explain Write the equation of a line with the given slope that goes through the given point.7) through: (3, -5), slope = -158) through: (3, 2), slope3 Write an explicit formula for a_nth term of the sequence 18, 6, 2, ... PLEASE HELPSheila and Jerome are lab partners. They have the following materials at their table:1 square of aluminum foil, 1 stirring rod, 1 beaker of water, 1 scoop of copper II chloride salt (blue color)Step 1:Jerome adds all the salt to the water and stirs. The salt crystals disappears and the liquid solution turns a clear blue.Step 2: Sheila tears up the aluminum foil into small pieces. Step 3: Jerome dares her to put the foil in his beaker. They see the edges of the foil turn a rusty orange. As they stir, the beaker becomes warm to the touch and a vapor begins to rise from the surface of the beaker. Within a few minutes, the foil has disappeared and the liquid is now clear. There are orange-rust colored flakes floating in the liquid.Q: Jerome claims that when the salt was added to the water it turned blue and the foil disappeared, these were chemical changes. He went on to explain that the chemical change was due to the fact that the atoms were speeding up. Sheila disagrees claiming that 1 is a physical change and 1 is a chemical change and Jeromes evidence is incorrect. Who is correct, Jerome or Sheila? Write a scientific explanation (CER) to support your argument. HELP ME PLEASE HURRY The characteristics of two different types of reactions are shown below:Reaction A: Electrons are gained by the atoms of an element.Reaction B: Protons are lost by the atom of an element.Which statement is true about the atoms of the elements that participate in the two reactions? Their identity changes in both Reaction A and Reaction B. Their identity changes in Reaction A but not in Reaction B. Their identity changes in Reaction B but not in Reaction A. Their identity remains the same in both Reaction A and Reaction B. You are running a concession stand at a basketball game. You are selling hot dogs and sodas. Each hot dog costs $2.25 and each soda costs $1.50. At the end of the night you made a total of $225.75. You sold a total of 126 hot dogs and sodas combined. You must report the number of hot dogs sold and the number of sodas sold. What equations did you use to solve this? How many hot dogs were sold and how many sodas were sold? 1 to 10 how good does my dog look healthy Find the arc length for arcs of circles as follows:radius: 12 inchescentral angle: radians- - - Versailles treaty Please help (30points) Pls answer rn due tmr pls pls fast A local band sells out for their concert. They sell all 1,175 tickets for a total purse of $28,112.50. The tickets were priced at $20 for student tickets, $22.50 for children, and $29 for adult tickets. If the band sold twice as many adult as children tickets, how many of each type was sold can someone explain why is the answer 3.1? A rental car company charges $33.73 per day to rent a car and $0.06 for every miledriven. Elizabeth wants to rent a car, knowing that:She plans to drive 450 miles. She has at most $430 to spend.Which inequality can be used to determine x, the maximum number of daysElizabeth can afford to rent for while staying within her budget? the narrowest official definition of the money supply is