Answer:
2
Explanation:
The second option is the only one that will work. The last would work but doesn't make the code any shorter.
Source lines of code (SLOC), also referred to as lines of code (LOC), is a software metric that counts the lines in the source code of a computer program to determine the size of the program. Thus, option B is correct.
What role of line of code if shortened?It might be argued that writing code in fewer lines rather than several lines is more effective. There are more places for bugs to hide, and it may be more difficult to find them if you have more lines of code.
By enclosing expressions in parentheses, long lines can be split into many lines. These should be used instead of a backslash to continue a line. Ensure that the continuation line is properly indented.
Instead of breaking before a binary operator, it is preferable to break after the operator.The same results can be achieved with fewer lines of code (and perhaps even better) than with many lines of code.
Therefore, The second option is the only one that will work.
Learn more about line of code here:
https://brainly.com/question/18844544
#SPJ2
5. 16 LAB: Brute force equation solver
Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. Given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10.
How do I write this in python?
Use the knowledge of computational language in python to write a code that force to find an integer solution for x and y .
How to find the solution of an equation in python?To make it simpler the code is described as:
def brute_force_two_equations(first_values, second_values,
max_range=10, min_range=-10):
for x in range(-10, 10, 1):
for y in range(-10, 10, 1):
if a * x + b * y == c and d * x + e * y == f:
print(x, y)
else:
print('No solution')
def equation(const1, const2, x, y):
return const1 * x + const2 * y
def get_three_integers():
inputs = []
for i in range(0, 3):
inputs.append(int(input("Please enter a value: ")))
return inputs
if __name__ == "__main__":
print("== First Equation ==")
first_equation_values = get_three_integers()
print("== Second Equation ==")
second_equation_values = get_three_integers()
solution = brute_force_two_equations(first_equation_values,
second_equation_values)
if solution:
print(f"(x, y) {solution}")
else:
print("No Solution found")
See more about python atbrainly.com/question/22841107
data in ai uses what >
Answer:
Explanation:
artificial intelligence describes the ability of computers to act like humans
A __________ structure can execute a set of statements only under certain circumstances. a. sequence b. circumstantial c. decision d. boolean
A structure which can execute a set of statements only under certain circumstances is: C. decision.
What is a decision structure?A decision structure can be defined as a type of structure that is used in computer programming or mathematical operations to execute a set of statements only under certain circumstances.
This ultimately implies that, a decision structure would only execute a set of statements provided that they meet the conditions that are set by the programmer such as under certain circumstances.
Read more on decision structure here: https://brainly.com/question/13297323
If you key a paragraph in uppercase and need to change it to sentence case without having to re-key the paragraph, which option would you use?
Answer:
I found the answer on quizlet and it said "sentence case" i don't know if its right but hope it helps
if you bet and another person bets do you get the money you bet and the money the other person bets?
example : say you bet on a computer game and your sister bets $5 and you bet $10 that you will win. Do you get the $10 and the $5 if you win from your sister or just the $5?
Answer:
I believe you would get both because since you both did a bet and you won, that would mean you should automatically get both of what yall put down.
Explanation:
I think that's what should happen but I'm not sure though.
Katie wants to use VLOOKUP for a column in a table. Which value of the mode perimeter should she use to look for an exact match of the searched data?
Answer:
The exact match mode is the mode parameter that Katie should use to look for an exact match of the searched data
Explanation:
The VLOOKUP function in Excel helps us search for and retrieve information from a particular column in a table and lookups a value in the left-most column of the table. It has two modes of matching.
Exact matching – When you perform a range_lookup, an argument FALSE is defined to mean that there is an exact match of the return value.
To achieve this, select a cell in your Excel worksheet
Type =VLOOKUP in the type bar of the Excel sheet
Select the value to look up and then select the data range
Type the column number that you want to search and then type FALSE
Press enter
What element allows text to be displayed in italics, which means the words are slanted to the right?
a
The < crooked > element
b
The < italic > element
c
The < em > element
d
The < slant > element
Answer:
the answer is the italic element
This is an example of what type of formula?
=(D1+D17)
The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function
What are functions in excel?There are different ypes of formula functions in excel such as;
SUMCOUNTCOUNTAIFTRIMMAX & MINNow, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.
Read more about Excel Functions at; https://brainly.com/question/14042837
Two ways of calculating average returns are ______ and ______. Multiple select question. the arithmetic average the progressive average the geometric average the common average
Answer:
"Geometric Average Return Example. Jennifer has invested $5,000 into a money market that earns 10% in year one, 6% in year two, and 2% in year three. If you were to calculate this using the arithmetic mean return, you would add the rates together and divide them by three, giving you an average of 6%."
Explanation:
45 POINTS
PLS HURRY
An issue with the automated collection of personal information is _____. Select 2 options.
it does not yet collect data efficiently
it does not yet collect data efficiently
it processes highly sensitive data
it processes highly sensitive data
that people do not trust it enough
that people do not trust it enough
it may lead to inaccurate decisions
it may lead to inaccurate decisions
it uses robust security solutions
it uses robust security solutions
Answer:
2 - It processes highly sensetive data
4- it may lead to inaccurate decisions
Explanation:
It processes highly sensitive data and it may lead to inaccurate decisions.
What is automated collection?The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.
There are two options:
It handles highly sensitive information.It may result in poor decisions.Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.
Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.
Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.
For more details regarding automated collection, visit:
https://brainly.com/question/14680064
#SPJ3
How do IT Support professionals measure success? Choose all answers that apply. You will get credit for all answers that are correct. Select 4 correct answer(s)
Using the SWOT analysis
Creating a C-Corporation
Customer satisfaction
Saving money in the bank
Call volume
Resolution time
Response time
IT Support professionals measure success through;
Using the SWOT analysis.Customer satisfaction.Resolution time.Response time.How do One measure success in information technology?IT success is known to be one that can be achieved by excelling in a lot of aspects such as:
Operational excellence.Delivering new functionality. keeping costs in line, etc.By using the four method above, one can know if IT is succeeding or not.
Learn more about success from
https://brainly.com/question/24553900
Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode
Answer:
Network Sniffing
Explanation:
Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.
Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.
How is packet sniffing done?Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.
Packet sniffing tools such as WireShark and SmartSniff are examples.
Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.
For further details about Packet Sniffing click here:
https://brainly.com/question/14417640
#SPJ4
75 POINTS!!
PLS HURRY
Choose the term that best completes each sentence.
___are intentional attacks on a system with the intent to do harm.
a. cyberthreats
b. malware
___ may be intentional like a virus or unintentional like a fire or human error.
a. cyberthreats
b. malware
Malwares are intentional attacks on a system with the intent to do harm.
Cyberthreats may be intentional like a virus or unintentional like a fire or human error
Hope that helps!
Chris is working with other employees on a worksheet. the other employees have made comments, but they are not visible.
what should chris do to ensure that he can see others’ comments?
a. select show all comments on the review tab.
b. select show no comments on the review tab.
c. select add comment on the review tab.
d select track changes on the review tab.
Answer:
a. select show all comments on the review tab
Explanation:
Please mark me brainliest if correct
Answer:
A
Explanation:
What two tabs does Outlook have that PowerPoint does not? View and Send/Receive Folder and Home Folder and Home Send/Receive and Folder
The main Outlook menu has a ribbon tab with default commands. File, Home, Send/Receive, Folder, and View are commands on the main ribbon tab. The Backstage view is where you can see information and options pertaining to the user account and settings.
Answer: view and send/recieve
Explanation:
PLEASE HELP! The variable initials is to be assigned a string consisting of the first letter of the string firstName followed by the first letter of the string lastName. Which of the following assigns the correct string to initials ?
Answer:
a
Explanation:
Prefix function will grab length character(s) from a string while concat function will join 2 strings into 1.
For initials, use prefix on firstName and lastName to grab the first character. Then join the two together using concat to give the initials:
So the answer is a.
The correct choice to the given function is "initials <--- concat (prefix (FirstName, 1), prefix (lastName, 1))", and its explanation as follows:
Prefix function:To assign the correct string, we must examine the "cancat ()" and "prefix ()" methods in this problem.
The string consists of the first letter of the string "firstName" followed by the first letter of the string "lastName", is to be set to the variable initials.
Please find the attached file for the complete solution.
Find out more bout the prefix function here:
brainly.com/question/14912735
You make me the happiest person on earth
i feel joy when i see your face
when i am depressed all i have to do is to think about you and it puts me in a good mood.
do i need to add more to thut
Answer:
Fixed
Explanation:
I feel joy when I see your face
When I'm depressed all I have to do is to think about you, and it puts me in a good mood.
How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object
Answer:
as an object in the hierachy panel
What is a critical consideration on using cloud-based file sharing and storage applications.
Answer:
Determine if the software or service is authorized
Explanation:
:)
what does computer graphics mean?
Answer:
Computer graphics deals with generating images with the aid of computers
Explanation:
Please help me!!!!!!!!!!! I really need help
The answer is a variable
Give 3 reasons why it is believed that smart phones precent us from communicating face to face.give three reasons why it is believed that smartphones prevent us from communicating face to face
Answer:
yes
Explanation:
because the people will be lazy to go and talk to that person instead They will call each other and discuss
write the algorithms for the problem How to post a letter ? you can put pictures for the steps
❖ Step 1: Start
❖ Step 2: Write a letter
❖ Step 3: Put in envelope
❖ Step 4: Paste stamp
❖ Step 5: Put it in the letter box
❖ Step 6: Stop
[tex]\frak{\fcolorbox{black}{pink}{Black Pink in your area$~$}}[/tex] ~←(>▽<)ノ
starting a computer after it has been turned off is term as
Answer:
Booting
Explanation:
How have you improved the technology function to provide the right services at the right price and right level of quality?
Website where customers can ask check the ,services and products, Using e-mail to improve customer service and respond to specific needs and More advanced data-gathering techniques, such as customer relationship management software.
How can technology help in customer retention?Deals can be sent via mobile. Customers would profit from promotions and coupons supplied to their mobile devices.
This behavior is growing more sophisticated and focused. You can send promos on products or services you know a consumer enjoys based on their purchase history.
Thus, Website, E-mail and software can improve the service quality.
For further details about technology, click here:
https://brainly.com/question/16877197
#SPJ4
how does computer science help in dance
Do not troll, I will be writing you up.
Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC to DC, and provides the power to drive all the system unit components.
Desktop computers have a power supply unit (PSU) that is located within the system unit and it provides the electrical power.
What is a desktop computer?A desktop computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.
Generally, desktop computers are fitted with a power supply unit (PSU) that is located within the system unit. Also, it plugs into a standard wall outlet (socket), converts alternating current (AC) to direct current (DC), and provides the electrical power that is required to drive all the system unit components.
Read more on computer here: brainly.com/question/959479
What does a black box represent in the system input/output model?.
Answer:
es un elemento que se estudia desde el punto de vista de las entradas que recibe y las salidas o respuestas que produce, sin tener en cuenta su funcionamiento interno.
Explanation:
10) ________ objects control the flow of the application. A) Boundary B) Utility C) Control D) All of the above
There are different kinds of applications. Control objects control the flow of the application.
What works the flow of control in a program?In computer, control flow or flow of control is known to be a type of an order function calls, instructions, and statements.
They are known to be used in the execution or in an evaluation when a specific program is running. Note that a lot of programming languages have the control flow statements, that helps to know the section of code is run in a program at any given time.
Learn more about application from
https://brainly.com/question/23275071
Which of the following best describes your sequence of actions when developing a web page?
Selected:a. Save the HTML file, Edit the HTML file, review the results, load the HTML file into the web browserThis answer is incorrect.
b. Edit the HTML file, save the HTML file, load the HTML file into the web browser, review the results
c. Review the results, save the HTML file, load the HTML file into the web browser, edit the HTML file
d. Load the HTML file into the web browser, edit the HTML file, review the results, save the HTML file
Answer:
I think D
Explanation:
Answer:
B
Explanation:
Saving it, then editing it wouldn't load the new changes
but editing it than saving it, would load the new Changes