I need help right away pleas! 30 points.

A website layout needs to be simple and reasonably organized.

Answers:
A) Design
B) User-Friendly Website Navigation
C) Call to Action
D) Elements

Answers

Answer 1

Answer:

I'm very sorry if I'm wrong but I think it's A


Related Questions

Here’s my last question

Answers

Answer:

Can't find it lolol

Explanation:

Where?

I’m bored too … hey

A wireless ________ extender is a network device that enhances transmission of your wireless signal.

Answers

Explanation:

A wifi range extender,sometime called a range expander,is type of wireless repeater used to exten wifi range.

Shell Scripting:

In the following statement, X is the initial value:

for (( X = N; X <= Y; X++ ))
True or False

Answers

True because if x sucks x then Y will spill juice cream team juice what how ….its true.

Shell scripts are most useful for repetitive tasks that would take a long time to accomplish if entered one line at a time. A few examples of uses for shell scripts are as follows: automating the process of code compilation. Programming or setting up a programming environment. Thus, it is true.

What role of Shell Scripting in programming?

You can access the Unix system through a Shell. It leverages the input you provide to execute programs. Once a program has finished running, its output is shown. In the shell environment, we may run our commands, applications, and shell scripts.

Programmers do not need to switch to a completely other syntax because the command and syntax are precisely the same as those placed directly on the command line.

Therefore, it is true that Shell scripts may be created considerably more quickly. Rapid start interactive bug-fixing.

Learn more about Shell Scripting here:

https://brainly.com/question/29625476

#SPJ2

different types of programming languages​

Answers

the main types are machine language, assembly language and high level language

Answer:

At the time of writing, some of the top programming languages include: 

C

Java 

Python

C++

C# 

Visual Basic 

JavaScript

PHP

SQL

Assembly language

R

Groovy 

Which part of the computer is responsible for managing memory allocation for all applications


A. Word processor


B. Operating system


C. Web browser


D. Intergrated development environment


I think it’s B but I’m not sure so I want to see if I’m right before answering

Answers

Answer:

Option B

Explanation:

The operating system is the type of software that is responsible for managing the processor time and also the memory allocation in the system. The operating system mainldeals with the processor time by scheduling the processor work done in the system.

The OS mainly controls the system and then schedule the execution of various types of function by the central processing unit (CPU). It also controls the memory allocation in the system.

The part of the computer responsible for managing memory allocation for all applications is the operating system. The correct option is B.

What is an operating system?

The operating system is the kind of software in charge of controlling the system's memory allocation and CPU usage. By scheduling the system's processor work, the operating system primarily manages processor time.

The operating system (OS) primarily manages the system and schedules the central processor unit's performance of many types of functions. Additionally, it manages the system's memory allocation.

The CPU is the brain of the computer. It manages all the functions of the computer. It is a small rectangle chip-like structure present inside the box with other parts.

Thus, the part of the computer that is responsible for managing memory is the operating system. The correct option is B.

To learn more about the operating system, refer to the link:

https://brainly.com/question/6689423

#SPJ2

True or False. The 'C' programming language guarantees that R0 will always contain a zero value on the ATmega328P

Answers

Oh I had this question once and I think it was true!! Hope this helps! Merry Christmas!!

Building a String Library

Sometimes when programming you need to introduce a new data type and develop a library of functions for manipulating instances of that data type. Often this is done as methods on a new class but not always.

In this assignment, you'll be defining a collection of functions on strings, most of which already exist as methods on the str class. However, you should pretend that they don't already exist and define them as functions. Of course, you can't just use the existing methods. This will give you a bunch of practice on manipulating strings and also on defining functions.

In this assignment, you'll be defining a collection of functions on strings. You should define each of these as a new function with a function header as below. The description of each is in the comment supplied. Recall that strings are immutable, so you will have to return a new copy of the string for those that call for you to return a string. If you are returning the same string as the input, just return it; there is no need to make a new copy, and it wouldn't anyway.

The only string functions/methods to use:

ord, chr
indexing and slicing
append (i.e., ``+'')
len, in, not in
equality comparison (== or !=))
Looping over strings (while or for loops) and selection (if statements) are allowed. BUT You cannot convert the strings to other types such as lists.

Define each of the following functions, with semantics as indicated by the comment. In each of the following ch is a single character, str, str1, str2 are strings, and i is a non-negative integer. You do not have to validate the inputs, except as indicated; you can assume these types.

At least one question asks you to return two values. That really means returning a tuple (pair) of values. You do that as follows:

return value1, value2
This actually returns the pair (value1, value2). The caller can then assign the members of the pair to two variables:

x, y = pairReturningFunction() # assumes function returns a pair
z, w = (value1, value2) # assigning a tuple to 2 variables
If you like, you can use earlier functions in later ones, or define helper functions, though it shouldn't really be necessary. Note that some of these are trivial to write, while others are a bit harder. I have done the first one for you.

def myAppend( str, ch ):
# Return a new string that is like str but with
# character ch added at the end
return str + ch

def myCount( str, ch ):
# Return the number of times character ch appears
# in str.

def myExtend( str1, str2 ):
# Return a new string that contains the elements of
# str1 followed by the elements of str2, in the same
# order they appear in str2.

def myMin( str ):
# Return the character in str with the lowest ASCII code.
# If str is empty, print "Empty string: no min value"
# and return None.

def myInsert( str, i, ch ):
# Return a new string like str except that ch has been
# inserted at the ith position. I.e., the string is now
# one character longer than before. Print "Invalid index" if
# i is greater than the length of str and return None.

def myPop( str, i ):
# Return two results:
# 1. a new string that is like str but with the ith
# element removed;
# 2. the value that was removed.
# Print "Invalid index" if i is greater than or
# equal to len(str), and return str unchanged and None

def myFind( str, ch ):
# Return the index of the first (leftmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

def myRFind( str, ch ):
# Return the index of the last (rightmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

def myRemove( str, ch ):
# Return a new string with the first occurrence of ch
# removed. If there is none, return str.

def myRemoveAll( str, ch ):
# Return a new string with all occurrences of ch.
# removed. If there are none, return str.

def myReverse( str ):
# Return a new string like str but with the characters
# in the reverse order.
Expected output:

>>> from MyStringFunctions import *
>>> s1 = "abcd"
>>> s2 = "efgh"
>>> myAppend( s1, "e" )
'abcde'
>>> myCount( s1, "e")
0
>>> myCount( s1, "a")
1
>>> myCount( "abcabc", "a")
2
>>> myExtend( s1, s2 )
'abcdefgh'
>>> myMin( "" )
Empty string: no min value # Note the None doesn't print
>>> myMin( "zqralm" )
'a'
>>> myMin( "Hello World!" )
' '
>>> myInsert( "abc", 0, "d")
'dabc'
>>> myInsert( "abc", 2, "d")
'abdc'
>>> myInsert( "abc", 4, "d")
Invalid index # Note the None doesn't print
>>> myPop( "abcd", 1 )
('acd', 'b')
>>> myPop( "abcd", 0 )
('bcd', 'a')
>>> myPop( "abcd", 5)
Invalid index
('abcd', None)
>>> myFind( "abcdabcd", "a")
0
>>> myFind( "abcdabcd", "c")
2
>>> myFind( "abcdabcd", "f")
-1
>>> myRFind("abcdabcd", "d")
7
>>> myRFind("abcdabcd", "e")
-1
>>> myRemove( "abcdabcd", "a")
'bcdabcd'
>>> myRemove( "abcdabcd", "x")
'abcdabcd'
>>> myRemove( "abcdabcd", "d")
'abcabcd'
>>> myRemoveAll("abcabcabca", "a")
'bcbcbc'
>>> myReverse( "abcd" )
'dcba'
>>> myReverse( "" )
''

Answers

Code:

def myAppend( str, ch ):
# Return a new string that is like str but with
# character ch added at the end
return str + ch

def myCount( str, ch ):
# Return the number of times character ch appears
# in str.

# initiaalizing count with 0
count = 0

# iterating over every characters present in str
for character in str:
# incrementing count by 1 if character == ch
if character == ch:
count += 1

# returning count
return count


def myExtend( str1, str2 ):
# Return a new string that contains the elements of
# str1 followed by the elements of str2, in the same
# order they appear in str2.

# concatenating both strings and returning its result
return str1 + str2

def myMin( str ):
# Return the character in str with the lowest ASCII code.

# If str is empty, print "Empty string: no min value"
# and return None.
if str == "":
print("Empty string: no min value")
return None

# storing first character from str in char
char = str[0]

# iterating over every characters present in str
for character in str:
# if current character is lower than char then
# assigning char with current character
if character < char:
char = character
# returning char
return char


def myInsert( str, i, ch ):
# Return a new string like str except that ch has been
# inserted at the ith position. I.e., the string is now
# one character longer than before.

# Print "Invalid index" if
# i is greater than the length of str and return None.

if i > len(str):
print("Invalid index")
return None

# str[:i] gives substring starting from 0 and upto ith position
# str[i:] gives substring starting from i and till last position
# returning the concatenated result of all three
return str[:i]+ch+str[i:]

def myPop( str, i ):
# Return two results:
# 1. a new string that is like str but with the ith
# element removed;
# 2. the value that was removed.
# Print "Invalid index" if i is greater than or
# equal to len(str), and return str unchanged and None
if i >= len(str):
print("Invalid index")
return str, None

# finding new string without ith character
new_str = str[:i] + str[i+1:]

# returning new_str and popped character
return new_str, str[i]

def myFind( str, ch ):
# Return the index of the first (leftmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

# finding length of the string
length = len(str)

# iterating over every characters present in str
for i in range(length):
# returning position i at which character was found
if str[i]==ch:
return i
# returning -1 otherwise
return -1


def myRFind( str, ch ):
# Return the index of the last (rightmost) occurrence of
# ch in str, if any. Return -1 if ch does not occur in str.

# finding length of the string
length = len(str)

# iterating over every characters present in str from right side
for i in range(length-1, 0, -1):
# returning position i at which character was found
if str[i]==ch:
return i
# returning -1 otherwise
return -1

def myRemove( str, ch ):
# Return a new string with the first occurrence of ch
# removed. If there is none, return str.

# returning str if ch is not present in str
if ch not in str:
return str

# finding position of first occurence of ch in str
pos = 0

for char in str:
# stopping loop if both character matches
if char == ch:
break
# incrementing pos by 1
pos += 1

# returning strig excluding first occurence of ch
return str[:pos] + str[pos+1:]

def myRemoveAll( str, ch ):
# Return a new string with all occurrences of ch.
# removed. If there are none, return str.

# creating an empty string
string = ""

# iterating over each and every character of str
for char in str:
# if char is not matching with ch then adding it to string
if char!=ch:
string += char
# returning string
return string

def myReverse( str ):
# Return a new string like str but with the characters
# in the reverse order.

return str[::-1]

Get the user to enter some text and print it out in reverse order.

Answers

Answer:

strrev in c/c++

Explanation:

Capstone Project part 11 quiz

What is the following code snippet checking? (1 point)
while response != "yes":

Othat response variable is not yet yes

O that response variable is yes

O if "yes" is indexed in an array for the variable "response"

O if the response variable is "no"



If you give all answers you will have an amazing Christmas!

Answers

It is checking if the response is not yet yes

Which of the four factors of production are hit the hardest when high unemployment occurs ?

Answers

Answer:

Economic growth,cyclical and structural factors, demographics, education and training

Explanation:

.........

conclusion for project for computer​

Answers

OK this question is answer easy the computer important of future

Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself. The program should ask for a destination file to save as the last question.

Answers

Answer:

there was a type of user name and sentences

Which cloud computing model allows users to create their own applications given a specific set of tools

Answers

I believe Windows or Apple computers. Sorry if I’m not helpful.

Making data secure means keeping it secret

Answers

Answer:

Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, hashing, tokenization, and key management practices that protect data across all applications and platforms.

5. What is intellectual property? (1 point)
Brainliest if correct

Answers

Answer:

intangible property that is the result of creativity, such as patents, copyrights, etc.

Please mark as brainliest

Answer:

A creative work of an invention, designs or names and images used in commerce.

Role and responsibility of an IT professional

Answers

create the computer, network, and communication systems that an organization needs


Type the correct answer in the box

How is it possible to understand the flow of data in an organization?

Conducting ______ with each team member makes it possible to understand the flow of data in an organization.

Answers

Data ?? I think sorry if wrong ..

Write an if statement that assigns 0.2 to commission if sales is greater than or equal to 10000.

Answers

if (sales >= 10000)
commission = 0.2;

Which bits of the address would be used in the tag, index and offset in a two-way set associative cache with 1-word blocks and a total capacity of 512 words

Answers

size of block = 1 word = 8 bytes

number of blocks = size of cache / size of word

= 512 word /1 word = 512 blocks

In a two-way set associative cache, 2 blocks will form 1 set. So number of index = 512/2=256=2^8

Size of offset = 3 bits

size of index = 8 bits

Size of tag = 64-11=53 bits

What should you look out for when choosing snacks that seem healthy? How can you make sure that the snacks you are choosing are actually healthy?

Answers

Answer:

You can make sure that the snack is healthy by looking at the ingreadents. A healthy snack should not have alot of persavatives and sugars. A good golden rule is if you can't pronaunce the word then its not good for you.

Explanation:

Type the correct answer in each box. Spell all words correctly, and use numerals instead of words for numbers. If necessary, use / for the fraction bar(s). What is the hexadecimal equivalent of the decimal number 125.28? The hexadecimal equivalent of the decimal number 125.28 is

Answers

Answer:

125.28₁₀ in hexadecimal = 7D.47AE147AE1₁₆

Step-by-Step Explanation:

To convert decimal number 125.28, we convert its integer and fraction part individually and then add them to get the equivalent hexadecimal number, as below:

To convert integer 125 to hexadecimal, follow these steps:

Divide 125 by 16 keeping notice of the quotient and the remainder. Continue dividing the quotient by 2 until you get a quotient of zero.

Then just write out the remainders in the reverse order to get the equivalent hexadecimal number.

125 / 16 = 7 with remainder 13 (D)

7 / 16 = 0 with remainder 7

Here is the answer to 125 decimal to hexadecimal number:

7D

For converting decimal fraction 0.28 to hexadecimal number, follow these steps:

Multiply 0.28 by 16 keeping notice of the resulting integer and fractional part. Continue multiplying by 16 until you get a resulting fractional part equal to zero (we calcuclate upto ten digits).

Then just write out the integer parts from the results of each multiplication to get equivalent hexadecimal number.

0.28 × 16 = 4 + 0.48

0.48 × 16 = 7 + 0.68000000000001

0.68000000000001 × 16 = 10 (A) + 0.88000000000011

0.88000000000011 × 16 = 14 (E) + 0.080000000001746

0.080000000001746 × 16 = 1 + 0.28000000002794

0.28000000002794 × 16 = 4 + 0.48000000044703

0.48000000044703 × 16 = 7 + 0.68000000715256

0.68000000715256 × 16 = 10 (A) + 0.88000011444092

0.88000011444092 × 16 = 14 (E) + 0.080001831054688

0.080001831054688 × 16 = 1 + 0.280029296875

Here is the answer to 0.28 decimal to hexadecimal number:

0.47AE147AE1

Therefore, decimal number 125.28 converted to hexadecimal is equal:

7D.47AE147AE1

Write a program that:
a) Inputs TWO numbers and finds the average of both numbers, only if BOTH numbers are less than 100

Answers

Answer:

num1 = int(input("Enter number 1: "))

num2 = int(input("Enter number 2: "))

if num1 < 100 and num2 < 100:

   newnum = num1 + num2

   finalnum = newnum // 2

elif num1 >= 100 or num2 >= 100:

   print("Invalid input.")

else:

   pass

Explanation:

Gg ez.

(I assumed the language was python. Next time, put what programming language you want it to be in.)

Questions Description Explain how you will identify and use texts according to the function you wish for it to serve in the particular industry​

Answers

The texts have different purposes that can be identified with the following tips:

Identify the main ideas. Identify the author's purpose.

What is a text?

A text is a term to refer to the set of phrases and words ordered coherently to be interpreted and to transmit the ideas of an author (emitter or speaker).

Texts can have a variety of topics depending on the author's intention. For example:

Scientific texts: They are the texts that have the purpose of sharing scientific information with exact data and results of experiments or others. Literary texts: They are the best known texts that stand out for including a diversity of topics, they are characterized by telling an in-depth story. News texts: They are the texts that expose all the details of a news story and have the purpose of objectively reporting.

According to the above, to identify a text it is necessary to read it and identify the main ideas and the purpose of its author when writing it. Additionally, the texts are tools for different professions to teach skills, knowledge and techniques depending on the requirement.

Learn more about text in: https://brainly.com/question/1142673

Tumblr, Jaiku is an example of _____________ website.
a) Microblogging
b) Blogging
c) Social Networking
d) None of the Above​

Answers

Answer:

Microblogging

One of the best-known channels in the microblogging world. Twitter is a quick and convenient way to share short posts, GIFs, article links, videos and more. Pinterest: Companies on Pinterest link to products, articles and other useful information for audiences .

Explanation:

Hope this helps you !!

Define technical writing. The proposal introduces the ……. (5 Mark)

a) Results b) Objectives c) Researcher d) None of the previous

Answers

Answer:

B.objective

#carryonlearning

Briefly explain the Conleptual model 044
effective computer Based instruction
for adult outlining the three units
(output, process, input)

Answers

According to computer analysis, the concept of effective computer-based instruction for adults is the embedment of the fundamental parts of computer-based instruction to provide the expected stratagems for inquiry in CBI for adults.

The three (3) units output, process, and input

Output in CBI External supportCBI DesignInstructional Strategy design

Process in CBISelf DirectednessComputer Self EfficacyLearning Goal Level

Output in CBILearning OutcomeScreen DesignPractice Strategy

Hence, in this case, it is concluded that computer-based instructions can be effective for adult learning.

Learn more about Computer Based Instructions here: brainly.com/question/15697793

Can someone help me do this who ever does it first get 100 points :)

Answers

Answer:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

Explanation:

Wired: Means a cable or a wire connected thats the opposite of wireless.

Wireless is bascially a device with no cable needed.

3G: GB

4G: GB

5G: GB

Which of the following is not an Error Style for data validation?

Answers

Based on the Microsoft Excel data validation, the option that is not an Error Style for data validation is the choice that does not show an error alert.

Given that there is no option available, the best way to answer this question is to show the types of Error Styles for data validation available.

Different types of Error Style for data validationStop style: this will bring the option of "Retry, " "Cancel, " and "Help."

Warning style: this will show "Continue," with options of "Yes," "No," "Cancel," and "Help."

Information Style: this will ask you to input the whole number with the option of "Ok," "Cancel," and "Help."

Hence, in this case, it is concluded that the Error Style for data validation is Stop, Warning, and Information Style.

Learn more about Error Style for data validation here: https://brainly.com/question/18497347

What is information technology in relation to computers

Answers

Answer:

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data. ... The commercial use of IT encompasses both computer technology and telecommunications.

Answer:

Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.

Explanation:

Hope this helps


Which source would provide the best way to find valid information about climate change

Answers

Primary sources would be best

The primary source would provide the best way to find valid information about climate change.

What is Climate change?

Climate change may be defined as the change in the average conditions such as temperature and rainfall in a region over a long period of time. In more simple words, climate change refers to the long-term shifts in temperatures and weather patterns.

The burning of fossil fuels like coal, oil, and gas for electricity, heat, and transportation is the primary source of human-generated emissions. A second major source is a deforestation, which releases sequestered (or stored) carbon into the air.

Both of these sources are significantly responsible for the causation of climate change in the specific region over a long period of time.

Therefore, the primary source would provide the best way to find valid information about climate change.

To learn more about Climate change, refer to the link:

https://brainly.com/question/24793273

#SPJ2

Other Questions
Proportional relationship between x y cabbage 8:07, 8:58, ?, 10:43, 11:379:519:509:539:49 wich countries did control great britian during the colonial period please ask yourself what you can do to help others estimate quotients using compatible numbers lesson 4.5 answer key On the War Front, soldiers needed to use water in order to cool down the machineguns. In the absence of water, they used:A)sandB)snowC)fansD)urine How do I add mixed numbers? Hannah plans to spend 1/4 of her next month's incomeon rent, 1/12 on transportation, 1/6 on food, $520 onother expenses, and save $875. How much does she planto spend on food?Round up to the nearest cent Help help help help pelsss please please business What is an equation of the line with slope 6 and y-intercept -4? pls help on my maths Can someone please help me!!? Eight times a certain number plus ten is equal to twelve times the same number minus seven A plant dies if its pholem tissue removed why Which type of tissue adds structure tothe body?1. Muscle2. connective 3.nerve4.epithelial what was the main reason tanks were introduced during world war i? this music group had electric guitars but didnt have epic guitar solos like the rock bands of the 1970s and 80s. with lead singer eddie vedders strong yet raspy voice, the band __________ produced hits like even flow, black, and alive. 50 points for 5 questions p.s if u get brainliest u get 50 moe and then u have 100 SO YAAAAAAY1.What can federal appeals courts do?Choose all answers that are correct.Overturn the decisions of the district courts.Remand cases back to lower courts.Uphold the decisions of the lower courts.Recommend cases be heard by the Supreme Court.2.Why do the losing parties in civil trials and convicted criminals seek to involve the federal appeals courts in their cases?because they feel that laws were incorrectly interpreted or applied in their casesin order to force the winning side or the prosecution to present its evidence againbecause they believe that their cases should be heard by magistrate judgesso that new appellate juries will hear the facts of their cases3.How are federal judges selected?Candidates are nominated and appointed by the Supreme Court unless the president uses the veto.Candidates are nominated by Congress and voted upon by citizens over the age of 18 in federal elections.Candidates are nominated by current federal judges and appointed by Congress if the House approves by a two-thirds majority vote.Candidates are nominated and appointed by the president if the Senate approves by a majority vote.4.What are two roles of magistrate judges?Choose exactly two answers that are correct.to hear preliminary evidence and decide if a case should be brought to trialto appoint the U.S. attorney(s) for their districtsto issue court orders, such as search warrantsto deliver rulings on major cases involving federal law5.What is the main duty of the United States Supreme Court?to sentence or parole convicted criminalsto appoint judges to lower federal courtsto hear and rule on casesto ratify or veto new laws thx UwU MAX POINTS!!! Where did I go wrong? Please explain where I went wrong and redo it. Discuss five of the essential components of the venture formation process.