1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
castortr0y [4]
2 years ago
5

Multiple Select

Computers and Technology
1 answer:
s344n2d4d5 [400]2 years ago
4 0

Since you wrote a program to compare the portion of drivers who were on the phone. The statements are true are option  2, 3, 4 and 5:

2. You could modify the program to allow the user to enter the data.

3. A different set of observations might result in a larger portion of male drivers being on the phone.

4. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results.

5. It is important to test your program with a small enough set of data that you can know what the result should be.

<h3>What use does a driver program serve?</h3>

A computer software known as a driver, sometimes known as a device driver, that serves as a bridge between the operating system and a device such a disk drive, or keyboard. The device's collection of specific commands must be thoroughly understood by the driver.

In software, a driver offers a programming interface for managing and controlling particular lower-level interfaces that are frequently connected to a particular kind of hardware or other low-level service.

Therefore,  based on the fact that the code you have made is okay, you can make some a notes on what is good and not and then make adjustments.

Learn more about program drivers from

brainly.com/question/28027852

#SPJ1

You might be interested in
Analyze the following code. public class Test { public static void main(String[] args) { double radius; final double PI= 3.15169
sergiy2304 [10]

Answer:

The output of the given code as follows:

Output:

Area is: 12.60676

Explanation:

In the given code some information is missing so, the correct code to this question can be described as follows:

Program:

public class Test //defining class  

{

   public static void main(String[] args)//defining the main method

   {

       double radius= 2; //defining double variable radius

       final double PI= 3.15169; //defining double variable PI

       double area = radius * radius * PI; //defining double variable area that calculates values

       System.out.println("Area is: " + area); //print values

   }  

}

Explanation:

  • In the given java code a class "Test" is defined, in which a double variable "radius" is defined, which holds a value, that is 2.
  • In the next step, a double constant variable, that is PI is defined, that holds a value, that is "3.15169".
  • Then another double variable area is defined, that calculates the area value, and prints its value.
4 0
3 years ago
According to the text, the judicious use of elements such as bullets, numbers, boldface, italics, and capitalization in document
kaheart [24]

Answer:

Facilitating interactivity.

Providing visual variety.

Emphasizing key information.

Explanation:

The judicious use of these elements helps the author in various different ways. These characters facilitate the interaction of the reader with the text by making it easier for him to understand the best way to proceed with the reading. Moreover, they provide visual variety, which makes information easier to process for the reader. Finally, these characters also emphasize key information, helping with reading comprehension.

6 0
3 years ago
What does SMO stand for
Schach [20]
SMO - Social Media Optimization
8 0
4 years ago
Read 2 more answers
What would be printed out as a result of the following code? System.out.println("The quick brown fox" + "jumped over the \n" "sl
blagie [28]

Answer:

Nothing

Explanation:

The line of code is erroneous and as a result there wont be any printer output.

The program didnt follow the right algorithm required to write a good program, it is full of error and it is incorrect.

The likely result of the program or the only result will be to print nothing.

7 0
3 years ago
Read 2 more answers
In light of common budget constraints, explain how security professionals can participate in the training necessary to maintain
Anika [276]

Answer:

Security of the computer systems is becoming more crucial as the days go by due to events that threatens the safety and security of these computers, the internet and the resources shared on them.Security professionals are those people who have the necessary skill set to handle the security situation of the computers and network and can both maintains these systems and resolve  any security issue.

In light of the skill sets that they posses, they work for firms or they work on their own to maintain security. In general every skill needs to be revised and these skill is not an exception also there are newer threats and security issues which are arising every day hence there is need to maintain competence in their field which requires undergoing training and practice to handle the latest security threats that is constantly evolving each day.Due to the issue of budget constrains the security professionals can take the following actions in order to be able to participate in training:

  • Involve themselves in taking online courses over the internet
  • They can acquire self education materials , researches and case studies on both recent and past security events
  • They also engage in peer guidance and mentoring which would work in a vise versa way for information and knowledge exchange
  • participating in "hackathons" and  competitions as a way for them to identify the features and skill set to improve  

Explanation:

The question requires explanation so instead of answering the question by stating the points we first give a brief description of the state of  digital security in the world.Next we now talk about the security professionals ( who they are and what they do). Finally we then discuss about the need for training for these professionals and how these security professionals can access these training in a situation where there is a budget constrain issue  

8 0
3 years ago
Other questions:
  • In which career field, would the Computing Technology Industry Association's CompTIA A+ certification be useful?
    13·1 answer
  • Which of the following allowed Temple Grandin to design more humane means of slaughtering cattle? she treated the cattle as inca
    5·2 answers
  • If you change the aperture or shutter speed in aperture-priority (A) or shutter-priority (S) shooting modes why doesn't the imag
    5·1 answer
  • Help pls Do you think the current video game industry is likely to experience another ""crash"" (similar to the one in the 1980s
    13·1 answer
  • The growing network of physical objects that will have sensors connected to the Internet is referred to as the ________.
    13·1 answer
  • printArray is a method that accepts one argument, an arrayof int. The method prints the contents of the array; it does not retur
    5·1 answer
  • WILL MARK BRAINILY!!
    9·2 answers
  • What feature allows you to access previous copies of a document on OneDrive?
    15·2 answers
  • .
    5·1 answer
  • When a ____________ file is opened, it appears full-screen, in slideshow mode, rather than in edit mode.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!