How could these same commands be used on a computer or network operating system?

Answers

Answer 1

Answer:

To manipulate data into information


Related Questions

Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review?

Answers

Answer:

sequencing

Explanation:

from flvs

Answer:

Sequencing

Explanation:

The state way of grading drivers is called what?

*

Answers

Oh yeah I forgot what you did you do that I mean yeah I forgot to tell you something about you lol lol I don’t want to see it anymore

Write a program that computes and display the n! for any n in the range1...100​

Answers

Answer:

const BigNumber = require('bignumber.js');

var f = new BigNumber("1");

for (let i=1; i <= 100; i++) {

 f = f.times(i);

 console.log(`${i}! = ${f.toFixed()}`);

}

Explanation:

Above is a solution in javascript. You will need a bignumber library to display the numbers in full precision.

To create a public key signature, you would use the ______ key.

Answers

Answer:

To create a public key signature, you would use the _private_ key.

Explanation:

To create a public key signature, a  private key is essential to enable authorization.

A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.

The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.

The public key uses different keys to make data readable and unreadable.

The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.

Custom function definitions:________.
A. Must be written before they are called by another part of your program
B. Must declare a name for the function
C. Must include information regarding any arguments (if any) that will be passed to the function
D. all of the above

Answers

Answer:

D. all of the above

Explanation:

A option is correct and function definition must be written before they are called by another part of your program. But in languages such as C++ you can write the prototype of the function before it is called anywhere in the program and later write the complete function implementation. I will give an example in Python:

def addition(a,b): #this is the definition of function addition

    c = a + b

    return c    

print(addition(1,3)) #this is where the function is called

B option is correct and function definition must declare a name for the function. If you see the above given function, its name is declared as addition

C option is correct and function definition must include information regarding any arguments (if any) that will be passed to the function. In the above given example the arguments are a and b. If we define the above function in C++ it becomes: int addition( int a, int b)

This gives information that the two variables a and b that are parameters of the function addition are of type int so they can hold integer values only.

Hence option D is the correct answer. All of the above options are correct.

Other Questions
what is the next 3 terms for (-6,42,-294,2058) PLease Help I WILL GIVE BRAINLEST Question 3: Determine the missing base in the equation problem below. 75eight = 23 base 53:42Read the paragraph.How should this paragraph be revised so that it iscorrect?Even though my life is very busy, I spend as much timeas I can with my family. I often ask my dad, who is anexcellent athlete, to play soccer with me. I also enjoytaking walks, baking desserts, and playing cards withmy mom. However, nothing is better than watchingmovies with my loyal, black cat, Max.The word "soccer" should be capitalized.The comma after "however" should be removed.The word "cat" should be capitalized.The comma after "loyal" should be removed.Mark this and returnSave and ExitMe Help!!!!! This is the last one. What if the secretion of that releasing hormone was insufficient? What would happen ?Ill give brainlist answer to who ever answer with a good answer What is your carbon footprint?the amount of carbon dioxide you use when recyclingthe amount of oxygen put into the atmosphere due to your consumption of fossil fuelsthe amount of carbon dioxide and oxygen in the atmosphere at any given timethe amount of carbon dioxide put into the atmosphere due to your consumption of fossil fuels What is the value of x? Enter only the number in the box! Help Asap What did the French establish in the Americas? A. fishing and fur trade B. gold and silver mines C. new communities D. slave trade In the sentence below, the highlighted coordinating conjunction ("FANBOYS") is 2sen^2 x+3 senx+1=0 2cotxsecx+ 2secx+cotx+1=0 senxcos^2 x=senx 2cos^2 x+2senx-12=0 2csc^2 x+cot^2 x-3=0 It was 7 degrees below zero in the morning. By afternoon the temperature rose 15 degrees. How warm was it? Which best describes ancient Greek war ships tHow do you think people in our society would respond if they had enforced handicaps? 18) Which is the concluding sentence of paragraph 2?A) Every day, the children play and swim in the lake.B)In fact, it seems that nighttime never comes, and thesun always shinesC)The film's story centers on a group of a dozenchildren from the town.D)This close-knit group, which becomes known as theLakeside Twelve, gathers daily by the lake, How does this quote reflect the influence of Enlightenment ideas on the Founding Fathers? AThey had reservations about self-government. BThey were concerned with property rights.CThey supported individual liberties. DThey created a limited monarchy.BenchmarkSS.7.C.1.1 An electronics manufacturer has 175 capacitors and the same number of capacitors is needed for each circuit board made. The manufacturer uses the capacitors to make 35 circuit boards. Identify and interpret the intercepts, then use the intercepts to graph the line Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review? The scale of a map is 1.5cm : 75km. What is the actual distance between twotowns that are 3.5cm apart on the map? A chant melody with elongated rhythms sung beneath one or more fastermelodies is called:A. polyphonyB. Gregorian Chant.C. cantus firmus.D. Anglican chant.