what does receive input mean in coding? I will give brainliest if you want just ask :3 no random answers please. AND HURRY.

Answers

Answer 1

Answer:

It is a way for the codebase to interpret data based off of what a user types or enters in a specified area.

Answer 2

Answer:

to provide or give something to the computer
in other words, when a computer or device is receiving a command or signal from outer sources, the event is referred to as input to the device.

Explanation:


Related Questions

PLEASE HELP ASAP IT'S DUE TODAY! WILL GIVE BRAINLIEST, FIVE STARS, AND THANKS!! PLEASE HELP!

Answers

Answer:

Tell the manufacturer to work on the airbags.

Explanation:

The airbags are one of the best life-saving devices, for example if you were in a car crash, airbags would save you from the glass shards, hitting your head against something in the car and falling unconscious, etc.

What is revising?

UMMM ye I

Answers

Answer:

Revise a manuscript again in order to make corrections or improvements. Revision is a process in the writing of rearranging, adding, or removing paragraphs, sentences, or words. During the writing process or after a draft is completed, writers may revise their work.

Explanation:

Do you think having a common platform (e.g. operating systems, hardware types, cloud devices, etc.) for your servers makes it easier to secure, or does having a limited number of platform provide a larger target for hackers

Answers

Answer:

yes i think so

Explanation:

it makes it easily accessible

Wider channel bandwidth ________. increases transmission speed allows more channels to be used in a service band both increases transmission speed and allows more channels to be used in a service band neither increases transmission speed nor allows more channels to be used in a service band

Answers

Wider channel bandwidth decreases transmission speed.

What is Wider channel bandwidth?

Wider WiFi channel widths is known to be a bandwidth that is made up  of 40 MHz and 80 MHz width.

They are known to be used often in the 5 GHz frequency band. In this type pf band, there are said to have a lot of WiFi channels and also less overlapping channels and as such, Wider channel bandwidth decreases transmission speed.

Learn more about bandwidth  from

https://brainly.com/question/4294318

4.11 LAB: Remove gray from RGBSummary: Given integer values for red, green, and blue, subtract the gray from each value.Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray).Given values for red, green, and blue, remove the gray part.Ex: If the input is:13050130the output is:80 0 80Find the smallest value, and then subtract it from all three values, thus removing the gray.Note: This page converts rgb values into colors.LAB

Answers

Answer:

Written in Python

rgb = []

colr = []

for i in range(0,3):

     inp = int(input("Input: "))

     if (inp >=0 and inp<=255):

           rgb.append(inp)

     else:

           print("Range is 0 to 255")

           exit()

colr.extend(rgb)

rgb.sort()

for i in range(0,3):

     print(colr[i] - rgb[0])

Explanation:

The next two lines declares two empty lists

rgb = []

colr = []

The following iteration lets user input into rgb list

for i in range(0,3):

     inp = int(input("Input: "))

     if (inp >=0 and inp<=255):

           rgb.append(inp)

     else:

           print("Range is 0 to 255")

           exit()

This line copies the content of rgb to colr

colr.extend(rgb)

This line sorts list rgb

rgb.sort()

This iteration calculates and prints the difference between each individual input and the smallest of the inputs

for i in range(0,3):

     print(colr[i] - rgb[0])

differences between the first four generations of computers​

Answers

Answer:

Explanation:

These first generation computer were mainly used for scientific computations. Some examples of these computers are ENIAC, EDVAC, EDSAC, UNIVAC I and IBM 701.

another one please tysm​

Answers

Explanation:

5-blue

6-Mixing primary colors creates secondary colors. for example: if you mix blue and yellow, you get green

7- orange

8- shape

Who is the traitor of UA?

1 Karishma

2 Yuga Aoyama

3 Denki

4 Mineta

Answers

Answer:

your answer is yuga Aoyama

analyze the ethical issues in the use of information technology in Multinational company (MNC) and support you answer with one example

Answers

Answer:

Explanation:

Multinational Companies tend to have millions of users from all over the globe who use their services and in doing so provide their information. This information gets saved on the databases of these companies. It is then up to the company on how they will use this information. This is where ethicality comes into play. A company can act ethically and protect the information that has been entrusted to them by their user, or they can act unethically and use the users' personal data to make profits. It has recently come to light that some companies have been using users' private data and would sell it to other companies for profit. These buying companies would then use the data for a variety of things such as ad targeting and statistics. These companies profited massively and the actual owners of the data did not, which makes this incredibly unethical.

PLEASE HURRY!!!!

What will be the output of the following program? Assume the user responds with a 5.
answer = input ("How many hamburgers would you like? ")
priceBurger = 3.00
moneyDue = answer * priceBurger
print ("You owe $", moneyDue)

A) An error occurs.
B) You owe $moneyDue
C) You owe $15.0
D) You owe $15

Answers

Answer:

The output will be you owe 15.0 dollars

Explanation:

Answer:

A. An error occurs

Explanation:

See attachment

The while loop is also known as what kind of a loop? entry-control loop operational loop infinite loop user-control loop

Answers

Entry control loop. Because a while loop can be infinite or not based on whether Boolean given is T or F. So we need to know the preexisting condition before we can solve it.

what are the five generations of computer based on computing characteristics​

Answers


Second generation 1950s-1960s Transistor based


Third generation 1960s-1970s Integrated circuit based


Fourth generation 1970s-present Microprocessor based


Fifth generation The present and the future Artificial intelligence

When you create a calculated item for a field in a PivotTable, it appears as a new item within the field. Question 4 options: True False

Answers

When you create a calculated item for a field in a PivotTable, it appears as a new item within the field is a false statement.

What is a calculated item in a pivot table?

A Calculated Item is known to be a kind of custom formula that is seen in an Excel pivot table.

It is known to be one that can use the sum of other items in the same field. For example, when a person calculate the sum of 2 other items in a field. Note that Calculated items are not depicted or shown in the PivotTable Field List.

Learn more about PivotTable from

https://brainly.com/question/15214258

what are the picture affect features​

Answers

Answer: ????????????????????????????

Explanation:

Should spreadsheets be used to capture the results of a science experiment?

YES
NO

Answers

Answer:

Yes

Explanation:

Spreadsheets should be used to capture the results of science experiments because they are good for sorting data. They make results easier and information easier to see and use.

No.

Graphs are often an excellent way to display your results. In fact, most good science fair projects have at least one graph. For any type of graph: Generally, you should place your independent variable on the x-axis of your graph and the dependent variable on the y-axis.

Which of the following can be used to offer a higher impedance to all frequencies except the resonant frequency?

A. RL time constant circuit
B. Parallel LC circuit
C. RC time constant circuit
D. Series LC circuit

Answers

Answer:

  D. Series LC circuit

Explanation:

Impedance changes monotonically with frequency for an RC or RL circuit. A parallel LC circuit has a maximum of impedance at resonance. Only the series LC circuit will have its lowest impedance at resonance, and a higher impedance elsewhere in the frequency spectrum.

Answer:

D. Series LC circuit

Explanation:

can be used to offer a higher impedance to all frequencies except the resonant frequency.

What is the purpose of a register in a CPU? Describe three types of registers.

Answers

Answer:

I hope this answer is correct

Explanation:

Internal registers include the instruction register (IR), memory buffer register (MBR), memory data register (MDR), and memory address register (MAR). The instruction register fetches instructions from the program counter (PC) and holds each instruction as it is executed by the processor.

Fill in the blank to complete the sentence.
If you only want to use the localtime function, you can load just that one function into active memory using the following line of code.

from _______ import localtime()

(Sorry for bad picture) ​

Answers

Answer:

The correct answer is time

Explanation:

from time import localtime()

how do artificial intelligence works?

Answers

Explanation:

AI systems work by combining large sets of data with intelligent, iterative processing algorithms to learn from patterns and features in the data that they analyze. Each time an AI system runs a round of data processing, it tests and measures its own performance and develops additional expertise

AI systems learn from the patterns and features in the data they study by combining vast volumes of data with sophisticated, iterative processing methods.

Each time an AI system processes data, it evaluates and measures its own performance and gains further expertise.

Due to the fact that AI never requires a break, it can perform hundreds, thousands, or even millions of tasks extremely quickly, acquiring a great quantity of knowledge in a short period of time and becoming extremely capable at whatever work it is trained to perform.

However, the key to properly understanding how AI works is to recognize that it is not a single computer program or application, but a complete discipline or science.

The goal of AI science is to develop a computer system capable of imitating human behavior in order to tackle complicated issues using human-like cognitive processes.

AI systems accomplish this goal by utilizing a variety of methodologies and processes, as well as a diverse array of different technology.

Using touch or mouse to move or copy cells is calLed_______.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

Using touch or mouse to move or copy cells is called Drag and Drop.

It can be called dragging when moving, or dragging or filling when copying. If you are using Fill Handle, you are filling, but you can also drag to copy something to a non-contiguous location with the mouse,  while holding the Ctrl key.

Should spreadsheets be used to keep score of a baseball game?

YES
NO

Answers

Yes, a spreadsheet can do the maths for you

What would be the most important data to access in the HRIS for the units and divisions of the MNE to determine feasible HR programs

Answers

The most important data to access in the HRIS to determine feasible HR programs is personnel cost.

What is HRIS?

HRIS is an acronym for human resource information system and it can be defined as a software system that is designed and developed, so as to help a business firm to collect, manage, and store detailed data on its employees or workers.

Generally, the important data to access in the human resource information system (HRIS) system for the units and divisions of the multinational enterprise (MNE) to determine feasible HR programs is personnel cost because it would affect the total amount of money that would be spent in training them on how to use the latest technology in the market.

Read more on HRIS here: https://brainly.com/question/23264557

Why laptop computer is called micro computer?​

Answers

Answer:

A lot top is a microcomputer because Michael computer has all the devices that you can use

what is the use of a router​

Answers

Answer:

Hope This Helps

A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page or email, is in the form of data packets. A packet is typically forwarded from one router to another router through the networks that constitute an internetwork until it reaches its destination node.

Explanation:

Answer:

It connects multiple devices together.

It transmits data to it's correct destination on a network through a process known as routing.

12 points. Fiona is starting to utilize the protection capabilities of Excel 2016. For the Lock or Unlock Cells function to work, which option should be enabled?

The Protect Workbook function needs to be enabled.

No functions need to be enabled other than the lock or unlock cells options.

The worksheet must be saved before the cells will become locked or unlocked.

The Protect Worksheet function needs to be enabled.

Answers

Answer:

The answer is D

Explanation:

just took the test on ed

In Microsoft Excel 2016, for the Lock or Unlock Cells function to work: D. The Protect Worksheet function needs to be enabled.

Microsoft Excel can be defined as a software application that is designed and developed by Microsoft Inc., to avail its end users the ability to analyze and visualize spreadsheet documents.

In Microsoft Excel, a Lock is used to prevent the editing and deleting of data stored in specific cells and ranges in a protected worksheet.

On the other hand, the Unlock Cells function allows data stored in specific cells and ranges in a protected worksheet to be edited and deleted.

In conclusion, Fiona must enable the Protect Worksheet function for the Lock or Unlock Cells function to work in Microsoft Excel 2016.

Read more: https://brainly.com/question/14299634

Whats the difference between pseudocode and python? please hurry!!! brainliest for fastest! :3 50 POINTS!!!

Answers

Answer:

Pseudocode is a more readable coding language that is used for repeating steps, however, is similar to python. It may exclude certain functions or details due to its level of readability, which has pros and cons.

Python, however, is a multi-purpose fun coding language that is, similar to HTML and Pseudocode, good for beginners. Python is simple and easy to learn. You can make games, store data, get user input, and much more.

Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function howManyEven to find the total number of even elements in the array. It should have input parameter array arrayIntValues. The function should return an integer.

Answers

Answer:

Follows are the method definition to this question:

int even(int A[MAX_ROWS][MAX_COLUMNS], int length,int width)//defining a method even,that accept 2D array and two integer variables  

{

int E_num = 0;//defining an integer variable E_num that holds a vlue 0

for (int i = 0; i < length; ++i)//declare for loop for row count

{

for (int j = 0; j < width; ++j)//declare for loop for column count

{

if(A[i][j]%2 == 0 )//use if block that check even number in array  

{

E_num++;//incrementing the value of E_num  

}

}

}

return E_num;//return E_num value

}

Explanation:

In the above code, a method "even" is defined, which accepts a 2D array "A" and two integers " length and width" in its parameter.

Inside the method, an integer variable "E_num" is defined that uses two for loop and an if block for the count the even numbers which are available on the 2D array.

please find the attahced file for method ouput.  

five aplications of ict​

Answers

Answer:

MS Word, MS Excel, MS PowerPoint, Adobe Photoshop, Adobe Reader

Explanation:

What is the error in the following pseudocode?
// This program uses an array to display five names.
Constant Integer SIZE = 5
Declare String names[SIZE] = "Meg", "Jack", "Steve", "Bill", "Lisa"
Declare Integer index
For index = 0 To SIZE
Display names[index]
End For

Answers

I do not know the answers sorryy

Explain two methods which the operating system may use to maintain the security of data stored on disk

Answers

Answer:

Measures that can be taken to keep data secure include: making regular backups of files (backup copies should be stored in fireproof safes or in another building) protecting yourself against viruses by running anti-virus software. using a system of passwords so that access to data is restricted.

Explanation:

The methods that the operating system may use to maintain security  are:

Regularly logging off or locking.

The use of data encryption methods to code data.

How do operating systems keeps security of data?

In the areas of Security utilities, there is often the use of encryption  to maintain data.

In this process, one can encrypt data as at the time it is been saved, or when one is trying to transmit it over a network. One can also use anti-virus software so as to check and blocks viruses.

Conclusively, the use of the methods above in the operating system may can help you to maintain security.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ2

Other Questions
Will mark YOU brainliest!!Which belief did John C. Calhoun have?O The federal government belongs to the American people.O The American System protects both the agricultural and industrial interests of the United States,O The Constitution sets up a government that can act without statesOStates have the right to nullify federal laws work out the perimeter of a semicircle with radius 4cm. Give your answer in term of Which table of input Values x and output values Y How many employees does Wikipedia have? plzzzz ...... Why is the result of CO2 bonds zero? Consider the set {sin2 x, cos2 x} in the vector space of differentiable real-valuedfunctions. Determine which of the following functions are in the span of theabove set: f(x) = 1, g(x) = 3 + x2, h(x) = sin x and k(x) = cos 2x. What reflection can I write with the phrase better poor with good health than rich with a sick body pls help me with this questions 1. In the following diagram, UW bisects XV at Y. Which of thefollowing statements must be true?U(1) The length of UW is twice the length of YW(2) The length of UY equals the length of YV(3) Y is the midpoint of UW.I(4) Y is the midpoint of XV.X According to Erikson, a successful resolution of the crisis in middle childhood will lead a child to a sense of what 2-[tex]2-\sqrt{x} +1 = \sqrt{x} +3[/tex] 80 POINTS AND BRAILIST 1. Mrs. Galicia is building a chicken farm in 2021 with an initial population of 3750 chickens. The farm grows at a rate of 2.15% annually. (a) Use the exponential growth model to write an equation that estimates the population t years after 2021. (b) Estimate the population of the town in 2036.MUST SHOW ALL WORK Ryder shot a model rocket over an area that consists of two grassy areas, shown in green, and an area with no grass, shown in white. A square is split into 3 sections. The bottom section is 5 acres, the middle section is 30 acres, and the top section is 15 acres. The top and bottom sections are shaded. What is the probability that his model rocket has landed in a grassy area? 0. 2 0. 3 0. 4 0. 6. What is the speed of a proton whose kinetic energy is 3. 2 kev What are the factors of x2 - 144?andbax2 + bx + c WHOEVER ANSWERS FIRST GETS BRAINLISTWhy did Antonio de Mendoza support de Nizas expedition? (6.1m+8m)+3 please help step by step please What is the Molarity of NaOH if it takes 2L of NaOH to reach the equivalence point in a titration with 5L of 0.4 M HCl? Assume a 1:1 mole ratio. i will give u brain thing its urgent!!!!! hello help me with this question thanks in advance