1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AVprozaik [17]
3 years ago
9

Programming terms!!Please need help!!!

Computers and Technology
1 answer:
Alexeev081 [22]3 years ago
8 0
1 algorithm
2 sequential
3 selection
4 loop
5 boolean
6 variables
7 expression
8 concatenation
9 operator
10 function
11 argument
12 event
13 event handler
14 class
15 object
16 instance
17 properties
18 methods
19 parameters
You might be interested in
Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
gulaghasi [49]

Answer:

special_num = int(input())

if  special_num == -99 or special_num == 0 or special_num == 44:

   print('Special number')

else:

   print('Not special number')

Explanation:

#get input

special_num = int(input())

#if function to evaluate true or false(aka Boolean)

if  special_num == -99 or special_num == 0 or special_num == 44:

#true evaluation

print('Special number')

#false evaluation

print('Not special number')

8 0
3 years ago
An attacker has hidden an NFC reader behind an NFC-based kiosk in an airport. The attacker uses the device to capture NFC data i
tatiyna

Answer:

Nfc relay attack

Explanation:

The NFC relay attack occurs when data is extracted by an attacker who puts himself in the middle of two parties having a communication with each other. As the message gets to a party, the attacker gets it and modifies it to their taste then passes it on.

This attacker in this question is extracting data by establishing communication between end user devices and reader in the kiosk

5 0
3 years ago
A cloud service provider uses the Internet to deliver a computing environment for developing, running, and managing software app
MakcuM [25]

The answer is PaaS (Platform as a Service)  

PaaS provides users with a cloud runtime environment in which they can develop, test, manage, and deliver applications. Users are able to use a suite of pre-built tools to develop and test their own apps. Thanks to these solutions, developers are able to deploy applications without the need of infrastructures such as servers, operating systems, or development tools.


6 0
3 years ago
What role does modern technology play in globalization today?
lana [24]

<span>Advances in technology are one of the main reasons that globalization has escalated in the past decade. In information and communication technology, innovations have become smaller in size, more efficient and often more affordable. In transport technology, vehicles have tended to become larger and faster, as well as becoming more environmentally friendly and cheaper to run. Whether for personal use or for business, technology has made the world seem a smaller place and assisted in the rise of globalization. </span>
6 0
3 years ago
Definition of firewall
miv72 [106K]
A partition made of fireproof material to prevent the spread of a fire from one part of a building or ship to another or to isolate an engine compartment, as on a plane, automobile, etc.
3 0
2 years ago
Read 2 more answers
Other questions:
  • Why might a programmer prefer the top-down approach to programming
    7·2 answers
  • When should you check to see that fuel lines, connections, and fuel vents are in good condition?
    7·1 answer
  • He has a new Wi-Fi router that connects wirelessly to a new desktop and two new laptops, in addition to multiple smartphones, ta
    8·1 answer
  • Write an if-else statement with multiple branches. If givenYear is 2100 or greater, print "Distant future" (without quotes). Els
    5·1 answer
  • Implement the RC4 stream cipher in C++. User should be able to enter any key that is 5 bytes to 32 bytes long. Be sure to discar
    7·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • Discuss the importance of top management commitment and the development of standards for successful project management. Provide
    10·1 answer
  • A computer that supports LoJack technology must have two main components installed. It needs an Application Agent (residing in t
    13·1 answer
  • Suppose you and four of your friends are wirelessly connected with the home wireless router. [03] At this moment router is not t
    11·1 answer
  • What was the strategy the company adopted for ERP implementation?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!