Application of technical writing

Answers

Answer 1

Answer:

python

Explanation:

Answer 2

The applications of technical writing are implied in every field of education. Some of its applications are given below:

The writing of papers, such as laboratory reports and project reports, for other people who are specialists in that field of education. Making the analysis of the research-based topics in the field of work. Performing any survey according to ground reports on the paper in the presence of a large number of people.

What is Technical writing?

Technical writing may be defined as a way of articulating in an apparent and concise way on the basis of some concept, idea, or instructions.

Therefore, it is well described above.

To learn more about Technical writing, refer to the link:

https://brainly.com/question/10652566

#SPJ1


Related Questions

Read the quotation from "Song of Myself."

It is not far, it is within reach,
Perhaps you have been on it since you were born and did not know,
Perhaps it is everywhere on water and on land.

Shoulder your duds dear son, and I will mine, and let us hasten forth,
Wonderful cities and free nations we shall fetch as we go.
In this quotation, the first stanza has a different style from the second section. What does this suggest about Whitman’s overall style in the poem?
that Whitman does not have a distinctive style as a poet
that Whitman’s style allows for various kinds of language
that Whitman is comfortable using traditional styles of poetry
that Whitman’s style conforms to age-old rules of poetry
Mark this and return

Answers

Based on the first stanza from "Song of Myself," the overall style suggests: B. that Whitman's style allows for various kinds of language.

What is a poem?

A poem is a literary work that comprises either written or spoken words which are carefully chosen and arranged in separate lines, especially based on their diction (sound), rhythm, and meaning.

Based on the first stanza from "Song of Myself," we can infer and logically conclude that the overall style suggests: B. that Whitman's style allows for various kinds of language.

Read more on Whitman's style here: https://brainly.com/question/12881683

#SPJ1

why charles babbage father of computer?​

Answers

Answer:

Due to basic concepts of Computer.

Explanation:

Charles Babbage Gave the basic concepts of Computer ( input , process and output) and he also used it in his computer. so charles Babbage is father of computer science.

What effect have computers had on your life?​​

Answers

Answer:

they are both a pain and a help

Explanation:

Computers can and do make life easier with access to more things ,in a simpler way and they are necessary for the way we live but sometimes they can cause stress, maby from what is on them or even things as simple and the responsibility of having one. Personally I do think they are more helpful than a stress creator.

A diagram of a ten-node network that uses ten routers

Answers

The diagram of the of a ten-node network that uses ten routers is given in the image attached.

What is a node in a network?

A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.

Note that they are known to often receive and send data from one network or endpoint to another.

Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.

Learn more about routers from

https://brainly.com/question/24812743

#SPJ1

9.2.8 last names codehs

Answers

Using the knowledge of computational language in python it is possible to write a code that tries to organize the names in an assorted way and any name can be included.

Writing code in python:

names_list = []

for i in range(0, 5):

   names_list.append(input("Name: "))

sorted_last_names = sorted([name.split()[-1] for name in names_list])

print(sorted_last_names)

See moer about python at brainly.com/question/18502436

#SPJ1

How do the InfoSec management team's goals and objectives differ from those of the IT and general management communities

Answers

InfoSec management team's goals and objectives differ from those of the IT and general management communities in terms of:

Strategic planningLevels of work.Risk management

How does SecDLC differs?

The SecSDLC is known to be a lot more  aligned with risk management practices and it is one that makes a huge effort in knowing the kinds of specific threats and risks, and makes or create and implements a lot of controls to counter those threats and aid in management of the said risk.

Therefore,  InfoSec management team's goals and objectives differ from those of the IT and general management communities in terms of:

Strategic planningLevels of work.Risk management

Learn more about management team's from

https://brainly.com/question/24553900

#SPJ1

i need help someone please !!

Answers

Work samples can be printed or placed on the web and should be appropriate for the job you are appyling for.

What is a work sample?

This is a sample such as a document that shows the interviewer the skills of the candidate to complete specific task. For example if the candidate is applying to a editor position, he/she can bring a sample of edition.

What are the characteristics of work samples?This should be done by the candidate.It should be relevant to the job applied.It can be online or printed.

Learn more about sample in: https://brainly.com/question/11045407

#SPJ1

Write a for loop that displays the following numbers exactly like this (you must use a loop):

3 7 11 15 19

Hint: notice the pattern of the numbers

Answers

Answer:

I will use c++ for this...

#include <iostream>

using namespace std;

int main() {

 int num = 0;

 int curr = 0;

 for (int i = 0; i<5; i++) {

   num = 3 + curr;

   cout << num << " ";

   curr += 4;

 }

}

public class Pyramid {

 public static void main(String[] args) {\

            int h = 7;

      System.out.println("Pattern A");

              for(int i = 1; i <= h; ++i)

              {

                  for(int j = 1; j <= i; ++j) {

                      System.out.print("+");

                  }

                  System.out.println();

              }

      System.out.println();

      System.out.println("Pattern B");

              for (int i = 1; i<=h; ++i)

              {

                for(int j = h; j >=i; --j){

                    System.out.print("+");

                }

                  System.out.println();

              }

          }

      }

What is the trick in this code is using a nested for loop?

The trick in this code is using a nested for loop

The outer for loop runs from i = 0 to the height of the triangle (in this case 7)

The inner for loop which prints the (+) sign runs from j = 0 to j<=i

It prints the + using the print() function and not println()

In the pattern B the loop is reversed to start from  i = height

Time and space are examples of an infinite loop, but I would also include human life. The water cycle is an example of a while loop since it will continue as long as the earth and water do. But the planet Earth probably won't last forever.

For loop: As the previous commenter noted, someone who works hard every month would be regarded as a for loop.

To learn more about infinite loop ,for loops, while loops refer to:

brainly.com/question/13148070

#SPJ7

A large global retail corporation has experienced a security breach, which includes personal data of employees and customers.

What would Accenture offer as the best solution to ensure enhanced security in the future?

Answers

The act that  Accenture would offer as the best solution to ensure enhanced security in the future is Data Protection program.

What is Accenture  about?

In Keeping client data protected, Accenture’s Information Security Client is known to be well built up with Data Protection program that can help client teams with a good approach and the security controls, etc.

Therefore, The act that  Accenture would offer as the best solution to ensure enhanced security in the future is Data Protection program.

Learn more about Accenture from

https://brainly.com/question/25682883

#SPJ1

What is the error in this program?
when
clicked
define Tickle
Tickle Cat
forever
touching mouse pointer ? then
play sound Giggle- until done
O A. The name of the function doesn't match the function that is
defined.
OB. There is no end block under the "Tickle Cat" function.
OC. All the blocks should be in one connected stack to function.
O D. The "forever" block should be removed so the "Giggle" sound
stops.

Answers

The error in this program above is that All the blocks should be in one connected stack to function.

What are the errors in a program?

In the act of developing a programs there are some kinds of error that can take place such as syntax errors, logic errors and others.

Note that in the program above, The error in this program above is that All the blocks should be in one connected stack to function and thus there is an error.

Learn more about program from

https://brainly.com/question/1538272

#SPJ1

Which tasks fall under WBS?
Kevin’s WBS for a project
Project manager Kevin has made a project plan for a software development project. a) Kevin calls a meeting with his team members to further discuss project requirements.
In the meeting they decide to b) break down deliverables into subdeliverables with detailed explanations.
After listing the tasks and milestones, the project team c) decides to enter the duration for each task. The entire list of tasks follows a logical sequence which aids in scheduling.

Answers

Answer:

Amongst them are a risk management plan, quality plan, procurement plan, communications plan, staffing plan, and a work breakdown schedule plan. The work breakdown schedule includes the start and completion dates for all tasks, activities, and deliverables defined in the WBS.

PLEASE HELP!

I accidently looked up a link, and now this same link keeps popping up everywhere, how do I stop this!?!? please help!​


On a phone.

Answers

To block link that keeps popping up everywhere, one can:

Use your browser and click on block Pop-ups  in settingsInstall an antivirus.

How do I stop pop-up links?

One can do so if they Manage the pop-up by blocking it in the Chrome browser where they:

Click on Settings from the Chrome menu.input 'pop' in the search bar.Select Site Settings  and then select Pop-ups and redirects.Here one can toggle the Pop-ups and redirections option to Blocked them.

Therefore, To block link that keeps popping up everywhere, one can:

Use your browser and click on block Pop-ups  in settingsInstall an antivirus.

Learn more about pop up link from

https://brainly.com/question/13666301

#SPJ1

What is the output?


>>>import time

>>>time.localtime()


a. the number of seconds since the epoch


b. the user's time zone


c. the date


d. the time


e. the time-zone offset


It is a select all that apply type of question

Answers

Answer:

a. the number of seconds since the epoch

Explanation:

time.localtime(), returns the number of seconds since the epoch if no argument is passed oyherwise it return struct_time in local time if you pass in seconds since epoch

Which statement best describes how the programming layer of abstraction in
a computing system functions?
A. It processes data using switches.
B. It allows computers to make animations.
C. It provides an interface for users to input data.
D. It processes data to perform computations.

Answers

The statement that best describes how the programming layer of abstraction in a computing system functions is that It provides an interface for users to input data.

What is the abstraction about?

In computer science, an abstraction layer is known to be full generalization of a kind of concept or algorithm, that is seen far from any particular implementation.

Note that generalizations is due to a lot of similarities that are best contained by models that shows similarities present in a lot of specific implementations.

Therefore, The statement that best describes how the programming layer of abstraction in a computing system functions is that It provides an interface for users to input data.

Learn more about abstraction from

https://brainly.com/question/7994244

#SPJ1

various types of mouse pointer

Answers

Answer:

Text Pointer

Busy Pointer

Link Pointer

Precision Pointer

Standard Pointer

Help Pointer

Background Busy Pointer

If I use the command right(90), which way will Tracy turn?
If correct I mark brainlist

Answers

Answer: Right

Explanation: If you use the Command Right (90°), it makes sense that Tracy turns right 90°...

If your laptop is not able to connect to your wireless network, which of the
following might be a likely cause of the problem?
A. The laptop is too far away from the source of the signal.
B. The display screen on the laptop is too small.
C. The signal from the wireless source is too strong for the laptop.
D. The laptop is operating from a battery rather than a wall outlet.

Answers

The answer is A! Hope this is helpful!
A should be the only answer !!:)

Select the skill that matches the following definition.​

treating others the way you want to be treated regardless of ethnicity, religion, gender, or orientation:
work ethic
integrity
respect
leadership

Answers

Answer: Respect

Explanation: Treat others with respect if you want to be treated with respect

View One | View All
2
A team of students is in the process of designing a control system. After
conducting extensive testing of the prototype, the team discovers that it does not
work as expected. The team returns to a previous step of the engineering design
process.
Which step should the team take next in order to complete this project?
to present their solution
to plan their next prototype tests
to design a new solution
to define their new problem

Answers

In the case above step should the team take next in order to complete this project is to to plan their next prototype tests.

What are the  steps in the design process?

The engineering design process is known to be made up of seven step and they are:

Define the problem AskImaginePlan Prototype Test Improve

Note that In the case above step should the team take next in order to complete this project is to to plan their next prototype tests because they have gone a step backward.

Learn more about engineering design process from

https://brainly.com/question/17711844

#SPJ1

In order to protect your computer from the newest virues which of the following should you do after you installed virus scan software

Answers

In order to protect your computer from the newest viruses, you should update the antivirus software and virus definition on a regular basis.

What is a virus?

A virus can be defined as a malicious software program that moves through computer networks and the operating systems (OS) installed on a computer (host), specifically by attaching themselves to different software programs, links and databases.

This ultimately implies that, you should update the antivirus software and virus definition on a regular basis, so as to protect your computer from the newest viruses.

Read more on a virus here: brainly.com/question/26128220

#SPJ1

can u please help me solve this

Answers

Alice has twice as many pencils as Cara. Leon has three more pencils than Alice. The three children have a total of 58 pencils.

What are the no. of pencils?

The no. of pencils are there totally as the 11.

Read more about the basic maths:

https://brainly.com/question/19493296

#SPJ1

Question 5
What keyboard button do you hold to select multiple cells simultaneously?
Shift
Alt
Ctrl
Tab
2 p
2 nts

Answers

Answer:

Ctrl hope it will help :)

Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method

Answers

Using the computational language in python we have to use it to write to a file and read with the code.

Writing this code in python we have:

filename = input()

file = open(filename)

lines = file.readlines()

data = {}

for i in range(0, len(lines), 2):

   num_seasons = int(lines[i].strip())

   show = lines[i + 1].strip()

   if num_seasons not in data:

       data[num_seasons] = []

   data[num_seasons].append(show)

file.close()

file_writer = open('output_keys.txt', 'w')

titles = []

for num_seasons in sorted(data):

   shows = []

   for show in sorted(data[num_seasons]):

       titles.append(show)

   file_writer.write(str(num_seasons) + ': ' + '; '.join(data[num_seasons]) + '\n')

file_writer.close()

file_writer = open('output_titles.txt', 'w')

for title in sorted(titles):

   file_writer.write(title + '\n')

file_writer.close()

See more about python at brainly.com/question/18502436

#SPJ1

I need help with some homework. I would like to know what is the easiest way to reach out.

Answers

I can help you, you can message me on this app.

Which two extensions in scratch are correctly matched to their accessibility goals
A. Pen extension
B. Translate extension
C. Video sensing extension
D. Text to speech extension
Choose two answers

Answers

The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

What are Scratch Extensions?

Scratch extensions are known to be used in an interface with external hardware and information outside of the Scratch website via new blocks.

Note that The two extensions in scratch are correctly matched to their accessibility goals Translate extension and  Text to speech extension.

Learn more about scratch  from

https://brainly.com/question/25720264

#SPJ1

1) What is Database? List its Uses.

Answers

Answer:

a database stores a large sum of data

Explanation:

its used to keep track of things like student names bank accounts and other things

Write code that does the following: opens an output file with the filename number_ list.txt, uses a loop to write the numbers 1 through 100 to the file, then closes the file.

Answers

Answer:

6

Explanation:

# create the file

filemane= "Testfile.txt"

# for writing, we create the iutput file:

output = open(filename, "w")

#Writibg numbers from 1-100

for item in range 1,101):

Which of the following answers is incorrect regarding the Naive Bayes algorithm?

Select the best answer (as an incorrect claim)

Select one:

A.
The algorithm uses the conditional probability of the feature given by the class.

B.
The features can be discrete, but can also be continuous.

C.
Because we want to prevent underflow, we calculate a sum of logs of the probabilities instead of their multiplication .


D.
We prefer features with high dependency to get better prediction.

Answers

Answer:

B. The features can be discrete, but can also be continuous.

Explanation:

Each continuous attribute can be discretized and the continuous attribute value replaced with the matching discrete interval.

Write an if-else statement that determines whether the variable points is outside the range of 9 to 51. If points is outside the range,
"Invalid Points" should be displayed. Otherwise, "valid Points" should be displayed.

Answers

Answer: Using Python

Explanation:

num = int(input("Enter number > "))

if num in range (9, 52):

   print("Valid Points")

else:

   print("Invalid Points ")

What's good computing?

Answers

Answer:

1.Use passwords that can't be easily guessed, and protect your passwords.

2.Minimize storage of sensitive information.

3.Beware of scams.

4.Protect information when using the Internet and email.

5.Make sure your computer is protected with anti-virus and all necessary 6.security "patches" and updates.

7.Secure laptop computers and mobile devices at all times: Lock them up or carry them with you.

8.Shut down, lock, log off, or put your computer and other devices to sleep before leaving them unattended, and make sure they require a secure password to start up or wake-up.

9.Don't install or download unknown or unsolicited programs/apps.

Secure your area before leaving it unattended.

10.Make backup copies of files or data you are not willing to lose.

Explanation:

Other Questions
Why does young children and elders need more protein Samuel is writing a research project on dinosaurs from the Cretaceous period.Which of the following searches would likely yield Samuel the best results?a.dinosaurs and cretaceousb.dinosaurs or cretaceousc.dinosaurs not cretaceousd.dinosaurs-cretaceous Read the excerpt from "The Danger of a Single Story by Chimamanda Ngozi Adichie.What struck me was this: She had felt sorry for me even before she saw me. Her default position toward me, as an African, was a kind of patronizing, well-meaning pity. My roommate had a single story of Africa: a single story of catastrophe. In this single story, there was no possibility of Africans being similar to her in any way, no possibility of feelings more complex than pity, no possibility of a connection as human equals.Which type of rhetoric does Adichie use to describe her feelings about the interaction with her roommate?antithesispathosironyethos Candymonium is the tallest, fastest, and longest coaster at what park?. Positive and negative aspect of bus stops 5-7 sentence PLEASSEEEEEEE if a person paid rs 32 as VAT to buy an article of cost Rs 2750 then how much money he /she pay? find it Essential Question (our overarching question): How does the author of the+ fiction piece draw on and transform themes, topics, character types, and/orother text elements from the myth, "Echo and Narcissus?"Question #1: How does the author of the fiction piece transform and connectthemes from the myth, "Echo and Narcissus?"Question #2: What topics are discussed in the fictional text, and how doesthe author draw on similar topics from the myth?Fictional Text = Dorian GrayQuestion #3: Compare and contrast the characters of the fictional text andthe mythQuestion #4: How does the author of the fictional text make connections tothe myth throughout the chapter? What is the molecule that DNAwraps around to becomechromosomes?A. histonesB. RNAC. lipid After 5 years, how much will marcia have saved in interest by consolidating the two balances? a. $1,526.40 b. $2,422.80 c. $105.00 d. $227.40 [100 POINTS] Find the values of x, y, and z. In the chart below, list the characteristics of the new constitution.The CouncilThe Council of EldersThe Directory The descriptions below explain two ways that water is used by plants on a sunny day.I. In a process called transpiration, some liquid water in leaves changes to water vapor. The water vapor is released into the air through tiny pores in the leaves. This allows more liquid water from the soil to be pulled up the roots and stem to replace water lost from the leaves.II. Plants use some of this water in leaves in a process called photosynthesis. During photosynthesis, water and carbon dioxide break apart and recombine to form two new substances, oxygen and glucose. Find the measure of angle A.66x +49x+83 What came first the chicken or an egg? slope of (6,1) (-3,8) The White Russian cocktail contains vodka, Tia Maria and milk in the ratio of 5:2:3. To make the cocktail for a party the barman used 180ml of milk. What was the total volume of the cocktail? If this was served in 60ml glasses, how many glasses would it serve? Which of these is a definition of stereotype? a. the behaviors and attitudes expected of people because of their gender b. a method of thought or argument that starts from a more specific idea to reach a more general conclusion c. any preferences or prejudices that a person has d. a belief about the personal attributes of the members of a particular group of people To verify the associative property of addition, beginby finding the sum of the polynomials:(3x + 4) + ((5x-1) + (2x + 6))x +X +DONE Drag the tiles to the correct boxes to complete the pairs. Not all tiles will be used.Consider the graph of the function . f(x) = ln x In wordsworth's ". . .tintern abbey" where is the speaker sitting? overlooking tintern abbey underneath a tree both of these none of these