1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lidiya [134]
3 years ago
6

8. A programmer wrote an essay for his history class, and realized he has confused the names of Benjamin Franklin and Alexander

Graham Bell. Instead of going through the whole paper and changing the names, he used the following incorrect algorithm in an attempt replace every occurrence of "Benjamin Franklin" with "Alexander Graham Bell" and vise versa:
First, change all occurrences of "Benjamin Franklin" to "apple"
Then, change all occurrences of "apple" to "Alexander Graham Bell".
Then, change all occurrences of "Alexander Graham Bell" to "Benjamin Franklin".
Here is an example of one of the sentences from the paper:
Alexander Graham Bell was born 141 years before Benjamin Franklin, so he was never able to telephone his neighbors.
Which of the following is the result of running the described incorrect algorithm on the sentence above?
A. Benjamin Franklin was born 141 years before Alexander Graham Bell, so he was never able to telephone his neighbors.
B. apple was born 141 years before Benjamin Franklin, so he was never able to telephone his neighbors.
C. Alexander Graham Bell was born 141 years before apple, so he was never able to telephone his neighbors.
D. Benjamin Franklin was born 141 years before Benjamin Franklin, so he was never able to telephone his neighbors.
E. Alexander Graham Bell was born 141 years before Alexander Graham Bell, so he was never able to telephone his neighbors.
Computers and Technology
1 answer:
zlopas [31]3 years ago
5 0

Answer:

E. Alexander Graham Bell was born 141 years before Alexander Graham Bell, so he was never able to telephone his neighbors.

Explanation:

Because in the end all names would be changed Alexander Graham Bell.

You might be interested in
Which of the following statements is the least abstraction of the World Wide Web?
denpristay [2]
<span>B.documents, images, and other data you can access by providing a URL (Web address)</span>
5 0
4 years ago
The banner on the front page of a newsletter that identifies the publication is the:.
podryga [215]

Answer:

Nameplate

Explanation:

The banner on the front of a newsletter that identifies the publication is its nameplate.

7 0
2 years ago
A _______ file is a type of vector graphics file created specifically for Windows.
Tems11 [23]
A .wmf <span>file is a type of vector graphics file created specifically for Windows.</span>
7 0
4 years ago
Read 2 more answers
What is the overall objective of an IT risk assessment? To assist IT management in establishing a budget for countermeasures To
QveST [7]
The overall objective of an IT risk assessment is to assist an organization in identifying risks and impacts.<span> The process includes discovering, correcting and preventing security problems.</span>
The IT risk assessment document identifies threats, estimates risks and determines how to manage them.
4 0
3 years ago
Lola wants to install an add-in in Excel.She has to unblock the add-in to allow Excel to open the add-in file automatically.To d
ololo11 [35]

Answer:

The correct answer is:

Properties (D)

Explanation:

First of all, option D (Properties) is the option that makes the most sense in this scenario, because the other options: Copy, Delete, and Rename are unrelated commands to what is to be achieved.

Secondly and more practically, an add-in file may not load in excel, and most of the time it is blocked by default and has to be unblocked. The following steps are used:

1. close Excel if it is open

2. open the folder where the add-in file is located, right-click on the add-in file, and select "properties"

3. a display tray will appear, having the attributes: Read-only, Hidden, Advanced, and unblock. Click the checkbox against "unblock" and make sure it is checked.

4. click Apply and Click Ok

Voila, your add-in file is unblocked.

<em>N:B The Images are for steps 2 and 3</em>

5 0
3 years ago
Other questions:
  • The salesperson in a cell phone store is telling me that the phone I'm considering has 8GB of memory, which means I can save 10,
    13·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Selet the correct answer.
    11·2 answers
  • Special variables that hold copies of function arguments are called _________.
    11·1 answer
  • H&amp;R Block's stated purpose is: to be the leading global consumer tax company bringing tax and related solutions to clients y
    15·1 answer
  • "In a web app, where is data usually stored? A. Mobile network B. Application storage C. Local computer D. Cloud storage"
    14·1 answer
  • Ites and days, on one of the slides in her school presentation. Which element can she use to
    12·2 answers
  • Select three advantages of cloud computing.
    12·1 answer
  • Write a program that calculates the amount of money in a savings account that earns a guaranteed yearly interest rate. The progr
    9·1 answer
  • What is 11x12x12x14x15x16
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!