1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
3 years ago
13

Given the following code segment, how can you best describe its behavior? i ← 1 FOR EACH x IN list { REMOVE(list, i) random ← RA

NDOM(1, LENGTH(list)) INSERT(list, random, x) i ← i + 1 }Required to answer. Single choice.
a. This code replaces everything in the list with random numbers.
b. This code shuffles the order of the numbers in the list by removing them and inserting them back in a random place.
c. This code removes all of the numbers in the list and inserts random numbers in random places in the list.
d. This code errors by trying to access an element at an index greater than the length of the list.
Computers and Technology
1 answer:
garik1379 [7]3 years ago
6 0

Answer:

Well, this code would box the whole body of an html document. by using the relative value for position, you are telling it to position relative to its normal position, which the top left corner is at (0,0). by using left: 50px, you are telling the box to set the left margin edge to 50px and by using top: 50px, you are telling it to set the top margin edge to 50px. by doing this shifting, the top left corner of the box, which is at (0,0) would be positioned at (50,50)

You might be interested in
What is technology?
Anestetic [448]
D. the application of scientific discoveries 
5 0
3 years ago
Which of the following bit patterns represents the value -9 in two’s complement notation?
nadya68 [22]

Answer:

B. 11110111

Explanation:

Binary representation of number 9 = 00001001

Binary representation of -9 would involve calculating the twos complement representation of 00001001

First we compute the ones complement of this number by reversing the bits.

00001001 => 11110110

Next we calculate the twos complement representation by adding 1 to the ones complement.

11110110+1 = 11110111

So the final representation is 11110111.

5 0
3 years ago
(0)
sashaice [31]

Answer:

  1. The keyboard and the mouse are  external parts of a computer
  2. A computer keyboard has 104 keys
  3. On a keyboard, the Enter/Return key is on the right  side.
  4. With the Caps Lock key on, you can type in  Capital letters
  5. The  Central Processing Unit is also known as the CPU
  6. The  spacebar is used to give space between two words
  7. Sit with your back straight while working on the computer.
  8. Do not use wet cloth to wipe the monitor screen
  9. MS Paint helps us to  paint and draw
  10. To increase or decrease the size of a drawing, we use the  tool magnifier.​

Explanation:

7 0
4 years ago
[ f r 3 3 p 0 1 n t s ]<br><br> what is one thing you are thankful for today?
Ainat [17]

Answer:

This

Explanation:

Thanks lol

3 0
3 years ago
When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. B
jeka94

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

<u>In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.</u>

6 0
3 years ago
Other questions:
  • Describe how the process of sampling, RGB pixels, and binary sequences work together to display a digital color image. Plz I got
    10·1 answer
  • During the Requirements Definition stage of a systems development​ project, the employees who will be the primary users of the n
    15·1 answer
  • A _____________ is a set of instructions used to perform calculations in a cell.
    14·1 answer
  • PreparedStatement ps = connection.prepareStatement("select firstName, mi, lastName from Student where lastName = ?"; ps.setStrin
    13·1 answer
  • 3. In a 32-bit CPU, the largest integer that we can store is 2147483647. Verify this with a
    12·1 answer
  • What do I do if my friend wants me to watch a video at my house?
    8·2 answers
  • Select the correct answer.
    14·1 answer
  • Convert 10101010 into decimal number system​
    13·2 answers
  • If known vulnerabilities in software are entry points for an attacker, why are the software vulnerabilities not corrected before
    12·1 answer
  • To meet the requirement for the number of vdss on board, what must be true about pyrotechnic vdss?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!