1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sonbull [250]
2 years ago
8

A ____ is someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process

data into information. Group of answer choices troubleshooter software developer computer developer computer manufacturer
Computers and Technology
1 answer:
Pani-rosa [81]2 years ago
4 0

Answer:

A programmer is someone who develops programs and apps or writes the instructions that direct the computer or mobile device to process data into information. Group of answer choices troubleshooter software developer computer developer computer manufacturer

You might be interested in
Write a program segment that simulates flipping a coin 25 times by generating and displaying 25 random integers, each of which i
Angelina_Jolie [31]

Answer:

//import the Random class

import java.util.Random;

//Begin class definition

public class CoinFlipper {

   //The main method

    public static void main(String []args){

       

       //Create an object of the Random class

       Random ran = new Random();

       System.out.println("Result");    

       //Use the object and the number of times for simulation

       //to call the flipCoin method

       flipCoin(ran, 25);

    } //End of main method

   

   

    //Method to flip coin

    public static void flipCoin(Random ran, int nooftimes){

        //Create a loop to run as many times as specified in variable nooftimes

       for(int i=1; i<=nooftimes; i++)

           System.out.println(ran.nextInt(2) + 1);

    }

}   //End of class definition

====================================================

Sample Output:

Result

1

1

1

2

1

2

2

1

2

1

1

2

1

2

1

1

1

2

1

1

1

2

2

1

2

========================================================

Explanation:

The above code has been written in Java. It contains comments explaining every part of the code. Please go through the comments.

The sample output from the execution of the code is also given above.

The code is re-written as follows without comments.

import java.util.Random;

public class CoinFlipper {

    public static void main(String []args){

       Random ran = new Random();

       System.out.println("Result");    

       flipCoin(ran, 25);

    }

   

    public static void flipCoin(Random ran, int nooftimes){

       for(int i=1; i<=nooftimes; i++)

           System.out.println(ran.nextInt(2) + 1);

    }

}

8 0
3 years ago
Assume TCP is operating in steady state congestion avoidance phase (no slow start) and the maximum congestion window size is 220
lianna [129]

The maximum possible TCP throughput is 12.01 Mbps.

<u>Explanation:</u>

TCP is a protocol offered by the transport layer and for data to be transferred by TCP, the two factors that TCP depends upon are the congestion window size and the RTT. The TCP throughput is calculated by this formula:   TCP throughput = Window size/ the RTT.

Now,

Congestion window size = 220 KB

= 220 \times 1024 bytes

= 225280 bytes

= 225280 \times 8 bits

= 1802240 bits.

Here, we have to convert the window size into bits so as to facilitate easier calculation.

RTT= 150 ms (milliseconds) = 150 \times 10^-^3 s = 0.15 s

We come to know that the RTT is 0.15 s.

Now, TCP throughput = Window size (In bits)/RTT

=\frac{1802240}{0.15}

= 12014933.33 bits/sec

= 12.01 Mbps

Therefore, the maximum possible TCP throughput is 12.01 Mbps.

6 0
3 years ago
Despite a wide variety of workplaces for those working in Human Services, all workplaces include
max2010maxim [7]

Answer:

employees and a computer

Explanation:

8 0
3 years ago
Which term describes an approach to security similar to defense in depth in that it supports multiple layers, but uses a differe
miss Akunina [59]

Answer:

The answer to this question is Diversity of Defense.

Explanation:

Diversity of defense:- It is an approach for security which supports multiple layers but the catch here is that at each layer a different mechanism of security is used or at most of the layers.The idea is that you do not need to have multiple layers of defense but different defenses also.  

So we conclude that the answer to this question is Diversity in Defense.

3 0
3 years ago
A(n) is a list of commands that tell your computer what to do.
Leviafan [203]
A program is a list of commands that tell your computer what to do<span />
7 0
3 years ago
Read 2 more answers
Other questions:
  • Qazwsxedcrfvtgbyhnujmikolp. In which direction on the keyboard did I type in?
    14·2 answers
  • Which kind of file would be hurt most by lossy compression algorithm
    8·2 answers
  • Your boss asks you to transmit a small file that includes sensitive personnel data to a server on the network. The server is run
    9·1 answer
  • What is one thing the ADDIE model does NOT account for?
    14·1 answer
  • Weak Induction
    8·1 answer
  • Which of the following is an example of an access object?
    9·1 answer
  • What is responsible for recording an image of an object with camera <br> Pls I neeed it right know
    8·1 answer
  • Timmy walks into a store to buy a PC game. He reads this information about a game on its packaging:
    7·1 answer
  • What is an OS? Explain the objectives of an OS.​
    11·1 answer
  • How can the absolute age of a rock be determined ?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!