Why can it be helpful to perform mathematical calculations using programming? Choose the best answer.

Answers

Answer 1

Answer:

The answer is below

Explanation:

Given that there is no available option.

Hence, It can be helpful to perform mathematical calculations using programming because

1. Programming is more viable and efficient in solving mathematical problems.

2. It is faster in getting an answer and easier to manipulate

3. It can be cheaper than human and be most time readily available

4. It can save and quickly recalls a memory


Related Questions

Select the correct answer.
What does a script supervisor do?
O A. supervises the final edits of the script
OB.
helps the video editor to segregate useful clips from the junk
Ос.
revises the initial script before the process of logging
D. keeps a close watch on the monitor
E.
carries out assembly editing for a production house

Answers

Answer:

B

Explanation:

Help me pls!!! last question
Tori needs to turn her Turtle to the left 90 pixels. Which line of code should Tori use?

tina(90)
tina.back(90)
tina.left(90)
tina.right(90)

Answers

Answer:

tina.left(90)

Explanation:

In code if you want your character to turn left you put "left" in your code and if you want your character to go right type "right" and so on and so on so your answer is tina.left(90)

Answer: Option C is the correct line of code Tori should use.

tina.left(90)

Explanation:

I took the test and got it correct, you can trust me.

,  Hope this helps :)

Have a great day!!

50 PTS
in Java
Write a program with a method called passwordCheck to return if the string is a valid password. The method should have the signature shown in the starter code.

The password must be at least 8 characters long and may only consist of letters and digits. To pass the autograder, you will need to print the boolean return value from the passwordCheck method.

Hint: Consider creating a String that contains all the letters in the alphabet and a String that contains all digits. If the password has a character that isn’t in one of those Strings, then it’s an illegitimate password!

Answers

import java.util.Scanner;

public class JavaApplication46 {

   public static boolean passwordCheck(String pass){

       String alphanum = "abcdefghijklmnopqrstuvwxyz1234567890";

       boolean legit = true;

       if (pass.length()>= 8){

           for(int i = 0; i < pass.length(); i++){

               if (alphanum.indexOf(pass.charAt(i)) != -1 && legit != false){

                   legit = true;

               }

               else{

                   legit = false;

               }

           }

       }

       else{

           legit = false;

       }

       

           return legit;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Enter a password: ");

       String password = scan.next();

       System.out.println(passwordCheck(password));

   }

   

}

I hope this helps!

Linux does not provide a GUI for its users.
-True
-False

Answers

Answer:

False

I know for a fact this is false.

Brainliest?

Answer:

it is false why would they not

A spreadsheet software program requires that users predefine each field’s data type. The software program is most likely programmed using a language that is
open.
predefined.
strongly typed.
weakly typed.

Answers

Answer:

Pretty sure its weakly typed

Answer:

strongly typed

Explanation:

Describe how each command is used by matching the command to its purpose.
removes data fror
places it on the cli
Paste
cancels a previou
Undo
restores a previou
Copy
duplicates data a
clipboard
Cut
Redo
places data in its

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The correct command matches its use are given below:

Paste   Places data in its

Undo   Cancel a previous

Copy    Duplicates data on the clipboard

Cut       Removes data for places it on the clipboard

Redo    restores a previous

Paste term is used when you are placing copied data. Undo is used to cancel a previous action performed while Redo is used to restores a previously performed action. The copy is used to duplicate data on the clipboard while Cut is used to removes data for places/ to paste somewhere else.

HURRY PLEASE

The software that allows programmers to write and run code is called an IDE True O False​

Answers

Explanation:

true

................

Answer:

False

Explanation:

Hope this helps.

Step into my world
Bittersweet love story about a girl
Shook me to the core
Voice like an angel, I've never heard before
Here in front of me
Shining so much brighter than I have ever seen
Life can be so mean
But when he goes, I know he doesn't leave

[Pre-Chorus 1: Charlie Gillespie & Madison Reyes]
The truth is finally breaking through
Two worlds collide when I'm with you
Our voices rise and soar so high
We come to life when we're

[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah
Perfect harmony

[Verse 2: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
You set me free
You and me together is more than chemistry
Love me as I am
I'll hold your music here inside my hands

[Pre-Chorus 2: Charlie Gillespie & Madison Reyes]
We say we're friends, we play pretend
You're more to me, we're everything
Our voices rise and soar so high
We come to life when we're

[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah
Perfect harmony

[Bridge: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
I feel your rhythm in my heart, yeah-yeah
You are my brightest, burning star, woah-woah
I never knew a love so real (So real)
We're heaven on earth, melody and words
When we are together we're

[Chorus: Charlie Gillespie & Madison Reyes]
In perfect harmony
Woah, woah
Perfect harmony
Woah, woah

[Outro: Charlie Gillespie, Madison Reyes, Charlie Gillespie & Madison Reyes]
We say we're friends
We play pretend
You're more to me
We create a perfect harmony

Answers

Answer:

THIS SONG IS FIRE AND WHEN IT HAPPENED IN THE SHOW, I FAINTED*

Explanation:

Julie and the Phantoms is my favorite thing in the world.

Umm, my computer is being rlly wierd and not letting me give brainliest to someone, anybody know what to do???

Answers

- Try restarting the device
- Use another device
- Re-install/Refresh your brainly page
- Wait for the issue to be gone
- Try doing it again
- Quit+Rejoin the app

Answer:

just restart it and when the computer is done restarting then repeat the process once more. This is what i did and it made a huge difference.

Explanation:

This resets the main hard drive and the reboots the system entirely. It helps clear out bugs and fixes any and all small issues.

Anisha was learning ‘for’ and ‘while’ loop. Help her understand why for and while loops are called entry controlled loops.

Answers

Entry controlled loop - The loop which has a condition check at the entrance of the loop, the loop executes only and only if the condition is satisfied is called as entry control loop.

So, for and while loops are its examples.

Why are many otherwise safety-conscious people victims of Internet crime?
A. They are naïve and gullible.
B. Hackers are smarter than criminals in the non-digital world.
C. Effective security measures are very complex.
D. They have not been educated in safe digital best practices.

Answers

Answer:

D

Explanation:

:)

The people who get or become the victims of internet crime are those who don't have been educated about safety in digital space.

Internet crime is cyber fraud. The crime involves the computer and the network, as it may be targeted for the victim. One needs to have complete knowledge of cyber security and safety procedures.

Hence the option D is correct.

Learn more about the people victims of Internet crime

brainly.com/question/5633960.

Modern commercial air travel is more akin to urban mass transit than it is to recreational travel true or false?

Answers

Answer:

true

Explanation:

because who knows how it works that way

Answer:

false

Explanation:

i got it right

The ______ is designed to store audio data on computers and/or digital music players.

A. waveform
B. audio file format
C. sample rate
D. bandwidth

Answers

Answer:

audio file formats of computer

Select all the lines that have a slope of 5/2

Answers

Answer:

Add a picture, then ask the question again.

The template code provided is intended to take two inputs, x and y, from the user and print "pass" if one or more of the following is true:
x is not less than 4
y is not greater than 5 and x + y is less than 7
However, when using De Morgan's law to simplify this code, the programmer has made some mistakes. Can you correct the errors so the code functions as intended?
/* Lesson 6 Coding Activity Question 2 */
import java.util.Scanner;
public class U3_L6_Activity_Two{
public static void main(String[] args){
Scanner scan = new Scanner(System.in);
int x = scan.nextInt();
int y = scan.nextInt();
if(!((x 5) || x+y > 7))
System.out.println("pass");
}
}

Answers

import java.util.Scanner;

public class U3_L6_Activity_Two{

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       int x = scan.nextInt();

       int y = scan.nextInt();

       if(x>=4|| ((y < 5) && ((x+y) < 7))){

           System.out.println("pass");

       }

   }

}

I'm pretty sure this is what you're looking for. Best of luck.

For formatting and readability sake, the given code is re-written as follows:

/* Lesson 6 Coding Activity Question 2 */

import java.util.Scanner;        // 1

public class U3_L6_Activity_Two{ // 2

   public static void main(String[] args){     // 3

      Scanner scan = new Scanner(System.in);   // 4

      int x = scan.nextInt();     // 5

      int y = scan.nextInt();    // 6

      if(!((x 5) || x+y > 7))         // 7

      System.out.println("pass");    // 8

    }

}

The line that needs to be fixed is the if statement in line 7.

As given in the instruction, the code prints "pass" if one or more of the following is true:

i. x is not less than 4. This can be re-written as;

 ! ( x < 4 )

ii. y is not greater than 5 and x + y is less than 7. This can be re-written as;

! (y > 5) && (x + y < 7)

To have the right operand of ii to have a negation, we can re-write as follows;

! (y > 5) && ! (x + y > 7)  (i.e changing the less than sign to greater than and then putting the negation sign (!)). This is great so that the De Morgan's law will be applicable on both sides.

Note:

a. ! is the Java's equivalent way of writing the logical operator NOT

b. && is the Java's equivalent way of writing the logical operator  AND

Since one or more of the conditions in (i) and (ii) need to be true before the "pass" is printed, we can combine (i) and (ii) using the OR operator ( || ) as follows;

! ( x < 4 )  ||  ( ! (y > 5) && ! (x + y > 7) )           ----------------(***)

The De Morgan's laws are very great for making deductions, equivalence and valid proofs when using logical operators.

The laws are as follows;

i. ∼ (P ∧ Q) = ∼ P ∨ ∼ Q

This can be written as;

! (P AND Q) = ! P OR !Q

or in Java like syntax as

! (P && Q) = ! P || !Q

ii. ∼ (P ∨ Q) = ∼ P ∧ ∼ Q

This can be written as;

! (P OR Q) = ! P AND !Q

or in Java like syntax as

! (P || Q) = ! P && !Q

Using these laws, we can simplify our expression in (***) as follows;

! ( x < 4 )  ||  ( ! (y > 5) &&  ! (x + y > 7) )

a. Start with the right side i.e ( ! (y > 5) && ! (x + y > 7) )

The De Morgan's law (stated in (ii) above) will remove the negation from both terms in the right side term, change the && to || and then put a single negation to apply to both terms in the bracket to give the following;

! ( x < 4 )  ||  ! ( y > 5  || x + y > 7 )

b. Now, there are two main terms - ! ( x < 4 ) and ! ( y > 5  || x + y > 7 ) separated by ||

Apply the De Morgan's law (stated in (i) above) to remove the negation from both terms, then change the || to && and then put a single negation to apply to both terms.

! ( x < 4  && (y > 5  || x + y > 7))

The result in b is the simplified version of the condition in the if statement.

The complete and corrected code is therefore written as follows;

/* Lesson 6 Coding Activity Question 2 */

import java.util.Scanner;        // 1

public class U3_L6_Activity_Two{ // 2

   public static void main(String[] args){     // 3

      Scanner scan = new Scanner(System.in);   // 4

      int x = scan.nextInt();     // 5

      int y = scan.nextInt();    // 6

      if(! ( x < 4  && (y > 5 || x + y > 7) ) )         // 7

      System.out.println("pass");    // 8

    }

}

Read more about De Morgan's law at: https://brainly.com/question/13317840

How has technology effected the way we communicate?

Answers

Indeed it has.

Advancements in technology and changes in communication generally go hand in hand. Landlines displaced the telegraph and cell phones replaced landlines. The arrival of the internet opened new doors of personal communication. E-mails replaced postal mails and social media took the place of text messages.

Communication technology, such as mobile phones, email, text messaging, instant messaging and social networking have had a profound effect on nearly everyone's business and personal lives. While technology makes communications faster and easier, at times it can also be intrusive and misinterpreted.

Increased isolation, reduced social interaction and social skills, and increased human-to-machine interactions are all a result of an overuse of technology, which has created a wall between many people globally.

Technology has the ability to enhance daily living from appliances to mobile devices and computers, technology is everywhere. ... In the rise of digital communication, technology can actually help communication skills because it allows people to learn written communication to varying audiences.

-Astolfo

Name the type of software which provides the user interface. [1 mark

Answers

Explanation:

user interface, also sometimes called a human-computer interface, comprises both hardware and software components. It handles the interaction between the user and the system.

There are different ways of interacting with computer systems which have evolved over the years. There are five main types of user interface:

command line (cli)

graphical user interface (GUI)

menu driven (mdi)

form based (fbi)

natural language (nli)


a.
Define a computer with its proper meaning.​

Answers

Answer:

Computer

Explanation:

a programmable electronic device designed to accept data, perform prescribed mathematical and logical operations at high speed, and display the results of these operations.

Answer:

computer

Explanation:

An electronic machine that processes, stores data, and does calculations.

WRITE IN YOUR OWN WORDS:
What is a possible sign that your computer has been hijacked by Botware?

Answers

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

In most places of work, how long should it take someone to respond to an e-mail?

no obligation to respond

one hour

twenty-four hours

one week

Answers

Answer:

24 Hours

Explanation:

Now Ideally, someone when they are working should respond immediately, but its 24 hours because, if someone is in a different Timezone, Or you sent an email late and tehy read it at 12pm or something it allows them good wiggle room while giving you a dcently fast reply.

Answer: 24 hours

Explanation: It's correct

In a science study group, Leonardo explains how atoms make up molecules. Talia repeats what Leonardo says in her own words. How is Talia practicing active listening? She is reflecting on what has been said. She is politely disagreeing with Leonardo. She is asking Leonardo a lot of questions. She is focused on only important information.

Answers

Answer:

A she is reflecting on what leonardo said but in her own words

Explanation:

Answer:

A: She is reflecting on what has been said.

Explanation:

Edge 2020

Which component in a CPU is responsible for transferring
data from one functional component to another?​

Answers

The data bus carries data from components to others

Identify an advantage of writing HTML code manually.

You do not have to learn HTML.

You can figure out how the markup affects the function of the site.

You can see rendered HTML as you go.​

Answers

Answer:

1. You retain 100% control over your site and where it is hosted

2. Free WYSIWYG sites aren’t really free

3. You make yourself seem irrelevant to clients

4. You understand your own code

5. Your own code is nearly always more efficient

6. Your own code is more secure

7. It’s easier to iterate your own code

8. Your own code is original

9. Writing your own code helps you grow as a developer

Explanation:

You can choose the points you want. let me know if you need any further information.☺️

Please rate if you happy

Brailliest if you want

Answer:

B. You can figure out how the markup affects the function of the site.

Explanation:

its the correct answer :)

1) I hurt my leg yesterday, and I had to go to the doctor. 2) I asked my mother to write an excuse for me to get back in school. 3) She wrote that I had twisted my ankle doing exxercise. 4) She also wrote that I had been prescribed some medicine that could make me sleepy. 5) Finally, she wrote that she wanted to exttend her apologies for my absence. 7. Which of the first four sentences contains an error in spelling? Sentence 1 Sentence 2 Sentence 3 Sentence 4

Answers

Answer: Sentence 3

Explanation:

Because exxercise is spelled wrong its spelled exercise.

Answer:

the correct answer would be 3 AND 5

3)She wrote that I had twisted my ankle doing exxercise.

        it is spelled wrong, it needs to be exercise

5)Finally, she wrote that she wanted to exttend her apologies for my absence.

       it is spelled word, it needs to be extend

hope this helped

Kellyn needs to move Slide 8 of his presentation up so that it becomes Slide 6. What best describes how he can do this using the slide thumbnails to the left of the main view?

A. He can right-click on Slide 6, then choose “Insert Before” and select Slide 8 from the options given.
B. He can right-click on Slide 8 and hold the mouse button while dragging up until the insertion point is after Slide 6.
C. He can left-click on Slide 8 and hold the mouse button while dragging up until the insertion point is after Slide 5.
D. He can left-click on Slide 6, then choose “Move To” and select Slide 8 from the options given.

Answers

Answer:

C

Explanation:

Most programs for slides allow the individual to click and drag a slide where it belongs.

C is the answer , it’s very easy

Someone plz im begging for ur help plzz??

Answers

Answer:

woah what subject is this-

Explanation:

Why might be one reason a stock becomes more valuable over time?
A. The industry is growing
B. The company is well managed
C. There’s a lot of demand on the product
D. All of the above

Answers

The answer is D all of the above
D all of the above.

Code Hs karal 3.4.2 lots of hurdles?? I cannot figure this one out at all

Answers

Answer:

codeHS 3.4.2: Lots of Hurdles answer

Explanation:

PLS HURRY!!
Look at the image below

Answers

Answer:

1. A function can use variables as parameters.

2. A function can have more than one parameter.

3. The definition of a function must come before where the function is used.

Explanation:

The definition of a function can come before or after it is used - I am pretty sure it cannot be placed after the function is being used. It should always come before it is used, so this statement is false.

A function can use variables as parameters - this is true, variables are just labels to hold data.

A function can have more than one parameter - this is true.

A function must have a return value - functions do not always have to return values. It could simply print, so this statement is false.

The definition of a function must come before where the function is used - As said earlier, the definition of functions must come before it is used/called. This statement is true.

Hope this helps :)

write the issue related to the cyber ethnic. ​

Answers

people may hack our person information.

Answer:

hiii ,and thank uuuu!!!!!!!

Other Questions
one of the following is not needed for photosynthesis:a- sunlight. b- oxygen. c- carbon dioxide. A plastic balls density is 0.802 g/mL. What volume would a 15.8 g plastic ball occupy? Surface area of 4m 5m 6m :) Evaluate the expression 2p - (p + 3) + 3 for p = 6. PLEASE HELP 15 POINTS N BRAINLIEST What is a transverse wave like? A family of four went to dinner at a local restaurant. Three of the family members ordered the special dinner that costs $12.88 each and the fourth family member ordered the hamburger and fries combo that costs $6.78. If they want to leave a 15% tip, which of the following expressions represents the amount of tip they should leave? A. (12.88+6.78)0.15B. (312.88+6.78)0.15C. 312.88+6.78D. [3(12.88+6.78)]0.15 What percent is 8 out of 32? Click to correct the three capitalization errors.Mark Twain spent his childhood on the Banks of the Mississippi River in Missouri,which influenced the themes and settings of his classic American novels. evaluate 8+t to the power of 3 when t equals 2 Smalles to greatest propose one change for both the republic and empire, which would have fixed the problems of Roman society What were the leaders of Political Machines called? The bottom one Staples has 9 cases of crayons with 1452 boxes in each caseOffice Depot has 6 cases of crayons with 504 boxes in each cateHow many total boxes of crayons do both stores hove? Who controls the factors of production in a Command Economy and who controls the factors of productionin a Market Economy? What happens over time to rock that is stressed?A The rock becomes gravelD. The color of the rock changes.C. The rock melta to liquidD. The shape of the rock deformsSUMMIT Reread paragraph 1. How does the structure of the paragraph show the illogical reaction to Moses?Re-read paragraph 12. identify the sentence fragments. What effect do these fragments have on the reader?Re-read paragraph 12. how does the author compare Tubman's possible fate to that of the runaways?Re-read paragraph 17. what effect does the use of the repeoted phrose, "would have to..." have on thereader?The passage.. Harriet Tubman: Conductor on the Underground Railroad by Ann Petry Paragraph 1 - Along the Eastern Shore of Maryland, in Dorchester County, in Caroline County, the masters kept hearing whispers about the man named Moses, who was running off slaves. At first they did not believe in his existence. The stories about him was so fantastic, unbelievable. Yet they watched for him. They offered rewards for his capture.Paragraph 12- But there were so many of them this time. She knew moments of doubt when she was half afraid, and kept looking back over her shoulder, imagining that she heard the sound of pursuit. They would certainly be pursued. Eleven of them. Eleven thousand dollars worth of flesh and bone and muscle that belong to the Maryland planters. If they were caught, the eleven runaways would be whipped and sold South, but she she will be probably be hanged.Paragraph 17- she turned away from the house, frowning. She had promised her passengers food and rest and warmth, and instead of that, there would be hunger and cold and more walking over the frozen ground. Somehow she would have to instill courage into these eleven people, most of them strangers, would have to feed them on hope and bright dreams of freedom instead of the fried pork and corn bread and milk she had promised them. PPPPPPLLLLLLLLLLLLZZZZZZZZZZZZIt's easy!!! Factorise2^2 3x 14 When writing a formal letter or e mail what kind of words should the writer use to convey a formal tone? Check all that apply.