1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Stella [2.4K]
3 years ago
11

What does the coding phase involve?

Computers and Technology
2 answers:
erica [24]3 years ago
8 0

Answer:

Ay homie the answer is B

Explanation:

Edmentum

Harman [31]3 years ago
5 0

Answer:

I do believe it is D im not sure

You might be interested in
Need help asap please​
Fofino [41]
Because you can make it to where they cannot find or see or look or talk or anything on your profile it can cut off Comunication from the person. It can also protect your safety!
6 0
3 years ago
Solution is c language please help me.​
nordsb [41]

Explanation:

in c++

#include<iostream.h>

#using namespace std;

main()

{ float x,y,z,r, phi, theta;

cout<<" enter the value of x";

cin>>x;

cout<<" enter the value of y";

cin>>y;

cout<<" enter the value of z";

cin>>z;

r = (sqrt(pow(x,2) + pow(y, 2) + pow(z, 2)));

phi = (asinf(y/r)*180.0f)/PI;

theta = (asinf(-x/(r*cosf(phi)))*180.0f)/PI;

cout<<"The radius r= "<<r;

cout<<"The phi angle= "<<phi;

cout<<"The theta angle= "<<theta;

return 0;

}

4 0
3 years ago
Which of these AWS resources cannot be monitored using VPC Flow logs?a) V​PCb) A​ subnet in a VPCc) A network interface atta
WINSTONCH [101]

Answer:

d) An Internet Gateway attached to VPC.

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Amazon Web Services (AWS) is an example of a cloud computing platform that offer its users a global cloud-based products and services such as storage, security, computing resources, database, analytics and management tools etc.

Some of the Amazon Web Services (AWS) resources that can be monitored using virtual private cloud (VPC) Flow logs includes;

I. A VPC

II. A subnet in a VPC

III. A network interface attached to EC2

However, an Internet Gateway attached to VPC is an AWS resource that cannot be monitored using virtual private cloud (VPC) Flow logs.

7 0
3 years ago
3. What is the value of a 4-band resistor which has the first band - Green, the
qwelly [4]

Answer:

56000 with a tolerance of 5%

Explanation:

5 6 + 3 zeros

3 is orange so that means you add 3 zeros when the orange band is present in the third position.

Green is 5

Blue is 6

Gold in the 4th band is the % tolerance. Gold is a 5% tolerance which mean that the real value is 5% either side of 56000/

The answer is B

4 0
3 years ago
Which of the following are recommended ways to address run-time errors? Choose all that apply.
Fittoniya [83]

Answer:

2. Add error routines that allow the program to execute fully even when unanticipated data is entered.

3. Create error messages to alert the user to an error in data entry.

4. Create controls in the program that ensure the input of proper data.

Explanation:

Mark me brainliest plz

6 0
3 years ago
Read 2 more answers
Other questions:
  • Think about your favorite technology item - phone, game, smartTV, etc. - Write about how your favorite technology item has impac
    7·1 answer
  • Gina is upgrading your computer with a new processor. She installs the processor into your motherboard and adds the cooling syst
    13·2 answers
  • Which item is essential to know before sketching a navigation menu flowchart? template specifics, such as horizontal or vertical
    12·1 answer
  • HELP URGENT
    12·2 answers
  • Given four inputs: a, b, c &amp; d, where (a, b) represents a 2-bit unsigned binary number X; and (c, d) represents a 2-bit unsi
    6·1 answer
  • A Security Policy is: a. How we implement security b. Corporate direction on behavior c. A statement of consequence for failure
    5·1 answer
  • Hi weegy, what is the latest android os?
    9·1 answer
  • Alex’s family members live in different parts of the world. They would like to discuss the wedding plans of one of their distant
    7·2 answers
  • Determining Uses for Outer Joins
    15·1 answer
  • What happen if ignore the unsafe markings in hand tools in ict​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!