what is the future of web development

Answers

Answer 1

Answer:

Creating websites that can execute automated tasks and new programing languages revolving around web development.

Explanation:


Related Questions

12.2 E-Z LOAN
A loan obtained from a lending institution is typically paid off over time using equal monthly payments over a term of many months. For each payment, a portion goes toward interest and the remaining amount is deducted from the balance. This process is repeated until the balance is zero. Interest is calculated by multiplying the current balance by the monthly interest rate, which is usually expressed in terms of an Annual Percentage Rate (APR). This process produces an Amortization Schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows. For example, the following amortization schedule is for a loan of $ 10.000 at an APR of 3.9% over a term of 30 months:3 will match months 12, 24, and 30 respectively.

Answers

Following an amortization schedule, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.

How much should be paid monthly to complete loan payment in 30 months?

The loan payment follows an amortization schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows.

The amounts to be paid is calculated using the amortization formula:

P = a ÷ {{[(1 + r/n)^nt] - 1} ÷ [r/n(1 + r/n)^nt]}

where

P is monthly paymenta is credit amountr is the interest ratet is the time in yearsn is number of times the interest is compounded

For the loan of $10000;

a = $10000r = 3.9% = 0.039nt = 30 months

Hence,

P = $10000 ÷ {{[(1 + 0.039/12)^60] - 1} ÷ [0.039/12(1 + 0.0.039/12)^60]}

P = $350.39 per month

Total payment in 30 months = $350.39 × 30 = $10511.7

Therefore, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.

Learn more about amortization schedule at: https://brainly.com/question/26433770

how to Develop Administrative Assistant Skills

Answers

Answer:

Multitasking, Flexible and resourceful.

Explanation:

im not sure what your asking for but to be or i dont now how to explain to good but hope you get what im mean it no brainier

Two gamers are programming each player in a football team to throw a football
across the stadium at a specific speed to arrive at the running back's hand. Which is
the parameter and which is the argument in the code below?
The parameter and argument are the same, speed by 5 or 2
The parameter is speed, the argument is 5 or 2
The parameter is 5 or 2, the argument is speed
There are no parameters or arguments

Answers

The parameter and  the argument in the code below is that the parameter is speed, the argument is 5 or 2.

Can programmers be said to be gamers?

Gaming is known to be a kind of starting point for new set of programmers  as a lot of game designers do uses different kinds of skills.

Note that in the above scenario, it the parameter is speed, the argument is needs to be 5 or 2 for it to work well.

Learn more about code  from

https://brainly.com/question/25605883

what does the GPU do?

Answers

Answer:

With graphics processing units (GPU), many pieces of data can be processed simultaneously, which makes them useful for applications such as machine learning, editing, and gaming. It is an electronics circuit capable of accelerating the processing of images, animations, and videos.

Explanation:

explains why it is important to select the correct data when creating a chart

Answers

Answer:

to be organized

Explanation:

because when you are organized to select the correct data, you won't confused

what is computers machain?

Answers

Answer:

the electronic device which take data process it and give meaningful results is called computer machine

20) Which of the following functions would take the word "Joe" (found in column A) and "Smith" (found in column B), and display "Joe Smith" in column C?

A. COMBINETEXT


B. TEXTJOIN


C. JOINTEXT


D. JOIN

Answers

Answer:

TEXTJOIN

Explanation:

TEXTJOIN is a common function of Ms Excel or Microsoft Excel

This function requires three arguments

delimiterignore_empty text1.

Answer:

TextJoin

Explanation:

Is the functions would take the word "Joe" (found in column A) and "Smith" (found in column B), and display "Joe Smith" in column C.

How many bytes/second is a 16Mbps cable modem connection?

Answers

Answer:

data transfer rate converter computer connection speed cable modem online converter page for a specific...cable modem to megabit per second(Mbps)

I need help with these certain questions on my activities in school

Answers

Answer:

*part 3 multiple choice*

1 d. none of the above

2d. water

3 a. insulator

*The Other Part*

4. electrons change direction of flow frequency in ""alternating current""

2. conductors

9.11: Array Expander
Write a function that accepts an int array and the array’s size as arguments. The function should create a new array that is twice the size of the argument array. The function should copy the contents of the argument array to the new array, and initialize the unused elements of the second array with 0. The function should return a pointer to the new array. Demonstrate the function by using it in a main program that reads an integer N (that is not more than 50) from standard input and then reads N integers from a file named data into an array. The program then passes the array to your array expander function, and prints the values of the new expanded array on standard output, one value per line. You may assume that the file data has at least N values.

Prompts And Output Labels. There are no prompts for the integer and no labels for the reversed array that is printed out.

Input Validation. If the integer read in from standard input exceeds 50 or is less than 0 the program terminates silently.

Answers

The Array Expander is an illustration of arrays and functions.

Arrays are variables that stores multiple valuesFunctions are named statements that are executed when called

The Array Expander program

The Array Expander program written in C++, where comments are used to explain each action is as follows:

#include <iostream>

using namespace std;

//This declares the Array Expander function

int* ArrayExpander(int *oldArr, int size){

   //This declares the new array

   int *newArr = new int[size * 2];

//This iteration sets values into the new array

   for (int i = 0; i < size * 2; i++) {

       if(i < size){

           *(newArr+i) = *(oldArr+i);

       }

       else{

           *(newArr+i) = 0;

       }

   }

//This returns a pointer to the new array

   return newArr;

}

//The main method begins here

int main(){

//This declares the length of the array, N

   int N;    

//This gets input for N

   cin>>N;

   int initArr[N];

//If N is between 1 and 50

   if(N > 0 && N <=50){

//This iteration gets values for the array

       for(int i = 0; i<N; i++){

           cin>>initArr[i];

       }

//This calls the Array Expander function

   int *ptr = ArrayExpander(initArr, N);

//This iteration prints the elements of the new array

   for (int i = 0; i < N*2; i++) {

       cout << ptr[i] << " ";

   }

   }

  return 0;

}

Read more abou C++ programs at:

https://brainly.com/question/27246607

Steps of booting a computer

Answers

Steps of Booting
The Startup. It is the first step that involves switching the power ON. ...
BIOS: Power On Self Test. It is an initial test performed by the BIOS. ...
Loading of OS. In this step, the operating system is loaded into the main memory. ...
System Configuration. ...
Loading System Utilities. ...
User Authentication.

What year was internet inverted

Answers

[tex]\large\blue{\mid{\underline{\overline{\tt { →\:January \:1, 1983}\mid}}}}[/tex]

ARPANET→Advanced Research Projects Agency Networkthe forerunner of the Internet.

[tex]\purple{\rule{15mm}{2.9pt}} \red{\rule18mm{2.5pt}} \orange{ \rule18mm{2.5pt}}[/tex]

[tex]\sf{\:мѕнαcкεя\: ♪...}[/tex]

Write a function named count_vowels that accepts two arguments: a string and an empty dictionary. The function should count the number of times each vowel (the letters a, e, i, o, and u) appears in the string, and use the dictionary to store those counts. When the function ends, the dictionary should have exactly 5 elements. In each element, the key will be a vowel (lowercase) and the value will be the number of times the vowel appears in the string. For example, if the string argument is 'Now is the time', the function will store the following elements in the dictionary: 'a': 0 • 'e': 2 'i': 2 'o': 1 'u': 0 The function should not return a value.

Answers

The function that counts the number of times a vowel exist in a string is as follows:

def count_vowels(string, dictionary):

    vowels = 'aeiou'

    dictionary = {}.fromkeys(vowels, 0)

    for i in string:

         if i in vowels:

              dictionary[i] += 1

    return dictionary

print(count_vowels("trouble", {}))

Code explanation.

The code is written in python.

we defined a function named "count_vowels". The function accept a string and an empty dictionary.Then. we store the vowels in a variable vowels.The dictionary is used to store the key value pair i.e the vowels and the number of times they appear.We looped through the string.If any value in the string is in vowels,  we increase the dictionary values by 1.Then, we return the dictionary.Finally, we call the function with it parameters.

learn more on function here: https://brainly.com/question/27219031

One problem with backlighting is that your subject may squint.

True

False

Answers

Answer:

I would say that's False. Backlighting would be behind them. So they wouldn't need to squint.

Explanation:

6. What are the arguments, pros and cons, for Python's use of indentation to specify compound statements in control statements

Answers

Answer:

[tex]beinggreat78~here~to~help.[/tex]

In some cases, one con is that it can be hard to keep track of your identation when coding long lines or blocks. The pro is that you may need to learn, which is not a bad thing. Learning is good.

For each of the following agents, describe all the possible PEAS (Performance, Environment, Actuators, and Sensors) and then identify the environment type. Self-vacuum cleaner  Speech recognition device Drone searching for a missing person Computer playing chess Alexa/Siri performing as a smart personal assistant.​

Answers

The PEAS environment type is a task environment space that is used in the evaluation of performance, the environment, the sensors and the actuators.

How to identify the environment type

For all of the options listed here, the environment types have to be put in tables. The table has been created in the attachment I added.

The use of PEAS helps in the performance of tasks in an independent way.

Read more on performance evaluator here: https://brainly.com/question/3835272

Which evidence best addresses the counterclaim?

a story about a girl who becomes a professional athlete after she graduates
quotations from teens and parents who fight with coaches
a story about a boy who gets bad grades because he plays too many sports
an example of how sports may lead to many injuries


an exclamation point
an exclamation point

Answers

Answer:

A. a story about a girl who becomes a professional athlete after she graduates

Explanation:

i hope this helped

positive and negative of adblock plus

Answers

Answer:

Pros and cons of ad blockers

Remove distracting ads, making pages easier to read.

Make web pages load faster.

Keep advertisers from tracking you across websites.

Reduce bandwidth (especially important with mobile devices)

Reduce battery usage (again, important for mobile devices)

p

which is considered both an input and output device?
A) Keyboard
B) Microphone
C) Speaker
D) Touchscreen Monitor
Please hurry :3 15 points

Answers

Answer:

speaker

Explanation:

its the one that gives sounds

Answer:

The answer would be D) Touchscreen Monitor

Explanation:

A Touchscreen monitor (such as a smartphone screen) outputs information to the user, while also recieving information from the user.

What is a value which we pass to the function to use in place of the parameter when we call it?

A. Parameter
B. Call
C. Procedure
D. Argument

Answers

Answer:
D) Argument

Explanation:
When you call a function, you pass in an argument as the input to use in the place of the parameter.

Type the correct answer in the box. Spell all words correctly.
Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added. How can his team produce this?
Craig's team can demonstrate this by creating a(n) {----------}
.

Answers

Answer:

A project scope

Explanation:

I just took this on plato

The team designs the website according to the team leader by a project scope.

What is a website?

The website is a set of web pages located under a single domain name,  generated by a single person or any organization.

Craig has told his team to design a website, but he wants to see a fully laid out detailed version before functionality can be added.

A project can be introduced to create a website for the team members whether individually or in a team.

Thus, the team produce this by a project scope.

Learn more about website.

https://brainly.com/question/19459381

#SPJ2

These are raised as livestock for meat and milk EXCEPT one
A. Hog
B. Goat
C. Carabao
D. Cattle

Answers

The livestock that is not raised for  meat and milk is  hog.

What are animals raised for meat?

Livestock are known to be some domesticated animals that are said to be raised in an agricultural farm to give labor and produce things such as meat, eggs, milk, etc.

The animals that are raised for their meat and milk are:

Boar BroilerCattle, etc.

Learn more about animals from

https://brainly.com/question/25897306

Use HTML and CSS, create a web page for the table shown below. Please copy (and paste) your code from your text editor (Replit).



Answers

This is big sorry I can’t do it

i need the full code for 6.1.3 code hs circles and squares please answer please help

Answers

In this exercise we have to use the knowledge in computational language in python  to write a code with circles and squares.

how to draw geometric figures in python?

inputs = 100

radius

   draw_circle(radius);

   pendown()

   begin_fill()

   circle(radius)

   end_fill()

   penup()

left(90)

forward(radius*2)

right(90)  

penup()

setposition(0,-200)

color("gray")

bottom_radius = int(input("What should the radius of the bottom circle be?: "))

draw_circle(bottom_radius)

draw_circle(bottom_radius)

See more about python at brainly.com/question/18502436

Identify three (3) general-purpose computing devices and write a short (no more
than one page) essay explaining in detail the computing process

Answers

The three (3) general-purpose computing devices used around the world are:

Desktop computersSmartphoneTablet

What is computing?

Computing refers to a process which involves the use of both computer hardware and software to manage, analyze, process, store and transmit data, so as to complete a goal-oriented task.

In Computer technology, a general-purpose computing device is a type of computer that can perform most common computing tasks when provided with the appropriate software application. Thus, three (3) general-purpose computing devices include the following:

Desktop computersSmartphoneTablet

Read more on computing here: https://brainly.com/question/19057393

Mike logged into a shopping website and entered his username and password. Which protocol will the website use to verify his credentials?

Answers

Answer:

I think it is email or password

How many intrusion switches are there in Dell Precision Tower 7920?

Answers

The number of  intrusion switches in Dell Precision Tower 7920 is one.

What is an intrusion switch?

There is an chassis intrusion switch that is often used in the detection of any unauthorized access that is found stepping into the interior of one's system.

This kind of switch is known to be often activated quickly when the system cover is removed and access is done or made to the interior of one's system.

Learn more about intrusion switch from

https://brainly.com/question/24369537

Which of the following are vector graphic file formats? Choose all that apply.

AI

PNG

RAW

SVG
Please help

Answers

There are different kinds of files. The option that is a vector graphic file formats is SVG.

What are vector files?

Vector files are known to be a type of images that are created by using mathematical formulas that stands as points on a grid.

The SVG  is known as Scalable Vector Graphics file and it is known to be a  vector image file format as it make use of geometric forms such as points, lines, etc.

Learn more about vector graphic file from

https://brainly.com/question/26960102

Answer:

AI and SVG

Explanation:

learned it from a comment i give all credit to them

Write multiple if statements:

If carYear is before 1967, put "Probably has few safety features.\n" to output.

If after 1970, put "Probably has head rests.\n" to output.

If after 1992, put "Probably has anti-lock brakes.\n" to output.

If after 2002, put "Probably has airbags.\n" to output.

Ex: If carYear is 1995, then output is:

Probably has head rests.
Probably has anti-lock brakes.

Answers

Hope this is good enough! Good luck.

Fumiko is a network technician. She is configuring rules on one of her company's externally facing firewalls. Her network has a host address range of 192.168.42.140-190. She wants to allow all hosts access to a certain port except for hosts 188, 189, and 190. What rule or rules must she write

Answers

The rule that she must write is that  A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

What is a Firewall?

A firewall is known to be a form of a network security device that helps one to manage, monitors and filters any form of incoming and outgoing network traffic.

This is often done based on an firm's formerly set up security policies. A  firewall is known as the barrier that exist between a private internal network and the public Internet.

See options below

What rule or rules must she write?

a) A single rule allowing hosts 140–187 is all that is necessary; the default-deny rule takes care of blocking the remaining nonincluded hosts.

b) Multiple rules are necessary for this configuration; one or more rules must define Deny exceptions for 188, 189, and 190, followed by the Allow rule for the 140–190 range.

c) A Deny rule is needed for 188, 189, and 190, and then exception rules for the 140–187 range.

d) The default Deny all rule needs to be placed first in the list, and then an exception rule for the 140–187 range.

Learn more about firewalls from

https://brainly.com/question/13693641

Other Questions
The line 1, has equation 3x + 5y 2 = 0.(a) Find the gradient ofl. what fraction of 1/2 square centimeter is 1/2 centimeter square Which of the following is an example of the fourth step, implement controls, in the 5-step Risk management process? Which sentence in the section "set objectives" supports the conclusion that assigning deadlines for different goals can be effective? In a parking lot there are only white cars, green cars, and red cars. If one car is selected at random from the lot, the probability that the selected car would be a green car is 1/6, and the probability that it would be a red car is 1/8. What is the probability that it would be a white car? Discuss what is an embedded system. Explain the relative advantages and disadvantages of an embedded OS based on an existing commercial OS compared to a purpose-built embedded OS. How many turning points are in the graph of the polynomial function?2 turning points3 turning points4 turning points5 turning points This year a total of 2,185 seventh and eighth grade students attended the junior high school one thousand forty three students are seventh graders how many students are eighth graders A cashier samples the transaction of every 10th person who goes through the line at a craft store. Out of 40 people, 32 used a coupon. If 750 people go to this store each day, how many people would you expect to use a coupon? 7.25 moles of air are pumped into a car tire. At 80C, the pressure inside the tire is 506.625kPa. What is the volume of the tire? Write the following in words in international system with comas: 34407615 You pick a card at random1) What is P(3)? ? You push an object really hard but it does not move. Has work been done? Yes No Quadrilateral ABCD is reflected over the x-axis to create ABCD. What are the coordinates of A'?Question 8 options:(2, 4)(-2, 4)(4, 5)(6, 12) Why do people use slang? Is slang necessary? Why or why not? A line passes through the point (-8,5) and has a slope of -3/4 .Write an equation in slope-intercept form for this line. An effective way to reduce the waste released into the environment would be to pass a lawOA. limiting the number of fish that can be caught in the river.OB. requiring the company to release its wastewater into a local pond.aOC. requiring the factory to pump its water to a treatment plant.OD. requiring people to avoid boating and fishing on the river. Evaluate the indefinite integral as an infinite series. arctan(x2) dx HELP ASAPWhen two things happen at the same time . . .(Choose all that apply) A. and both the cause and event have a similar pattern then it's possible to say the two are connected B. you should consider all possible causes and eliminate as many as possible that really could not be causes C. the events must be connected in some way D. and you can compare these things to another really similar event; then by identifying one difference between your event and the comparable event, you might be able to correctly identify the cause E. and you can find other examples of the same two things happening at the same time; then you can often find a common factor that will point toward the true cause or effect Find the slope of the line that is parallel and perpendicular to the following equation.y + 4 = -3(x +1)