1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hunter-Best [27]
3 years ago
5

Why are conditional statements valuable to programmers? Check all that apply

Computers and Technology
2 answers:
Gnom [1K]3 years ago
7 0

Answer:They provide a way for programmers to add decision-making to a computer program.

They allow programmers to specify conditions that must be met for an action to occur.

They allow a program to evaluate multiple values within a statement.

Explanation:

ValentinkaMS [17]3 years ago
6 0

Answer:

1,2 and 3

Explanation:

You might be interested in
20.
SpyIntel [72]
2Na hope that helps  ^^;
6 0
3 years ago
Read 2 more answers
The 7-bit ASCII code for the character ‘&’ is: 0100110 An odd parity check bit is now added to this code so 8 bits are trans
Lorico [155]

Answer

First part:

The transmitted 8-bit sequence for ASCII character '&' with odd parity will be 00100110. Here leftmost bit is odd parity bit.

Second part:

The invalid bit sequence are option a. 01001000 and d. 11100111

Explanation:

Explanation for first part:

In odd parity, check bit of either 0 or 1 is added to the binary number as leftmost bit for making the number of 1s in binary number odd.

If there are even number of 1s present in the original number then 1 is added as leftmost bit to make total number of 1s odd.

If there are odd number of 1s present in the original number then 0 is added as leftmost bit to keep the total number of 1s odd.  

Explanation for second part:

A valid odd parity bit sequence will always have odd number of 1s.

Since in option a and d,  total number of 1s are 2 and 6 i.e. even number. Therefore they are invalid odd parity check bit sequences.

And since in option b and c, total number of 1s are 5 and 7 i.e. odd numbers respectively. Therefore they are valid odd parity check bit sequences.

7 0
3 years ago
List 10 programs or applications on your computer other than any Microsoft office programs
Fofino [41]
Dropbox
Mozilla Firefox, Google Chrome
Gmail, Mozilla Thunderbird
CDburnerXP
Putty, Netflix,
Paint.net, Filezilla
3 0
3 years ago
The person who receives financial protection from a life insurance plan is called a:
tatiyna
The answer to this question is A. Beneficiary
Payer is the person who buy the insurance (not necessarily for themselves only, can be given to their family or friends). Insured can not only be a person, but it also can be an object (such as cars). And the giver is the company who provide the insurance service for the payer.
6 0
3 years ago
Read 2 more answers
Given the string variable address, write an expression that returns the position of the first occurrence of the string "avenue"
MrMuchimi
String temp;

for i = 0 to Address.length - 6 do 
begin
     temp = copy(address, i, i + 6) //returns a substring of a string beginning at
                                                     //i and ending at i + 6 
     if temp = 'Avenue' then
          return i;
   
end;
8 0
4 years ago
Other questions:
  • While visiting a web site during your lunch break, you see a window that states the web site will not operate properly without f
    13·1 answer
  • Plagiarism occurs when writers
    14·2 answers
  • 5. What are the two main functions performed by UPS​
    12·1 answer
  • The title element in the head section of an HTML document specifies the text
    14·1 answer
  • If an engineer wants to verify changes that she has been making on a router, which commands will allow her to check the routers
    15·1 answer
  • During which phase of the writing process is it best to have other
    11·1 answer
  • The sequence of instructions performed to execute one program instruction
    12·1 answer
  • You recently created a new network segment for the development department. Because the hosts are now on a different network segm
    6·1 answer
  • An embedded system describes computing technology that has been enclosed in protective shielding for security reasons. True or f
    12·1 answer
  • hich of the following is different on the Cisco switch CLI for a Layer 2 switch as compared with the Cisco router CLI?a. The com
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!