1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
katrin2010 [14]
3 years ago
11

What would give Lucy, an entry-level candidate, an edge over others while she seeks a programmer’s position? Lucy, an entry-leve

l candidate, is looking for her first job. Lucy has a high GPA in her college transcripts, skill using a multitude of software, and skills in many extracurricular activities. She completed an internship at a reputed IT organization while she was at college. Her portfolio contains many self-made programs.
Computers and Technology
1 answer:
In-s [12.5K]3 years ago
4 0

Answer:

She completed an internship at a reputed IT organization while she was at college.

Explanation:

Based on her accomplishments the one aspect that would give her an advantage and set her apart from the competition would be that she completed an internship at a reputed IT organization while she was at college. Having done this means that she gained extremely valuable and recognized work-place experience that would be extremely valuable to any IT company looking to hire someone. Her other traits are all things that every individual applying for such a position must have including the portfolio of self-made programs.

You might be interested in
Because health and safety are important in all workplaces, not just hazardous ones, what working conditions must ALL employers p
antiseptic1488 [7]
A since fire extinguishers are legally enforced 
5 0
4 years ago
Read 2 more answers
Create a Racket procedure compute_pos that reads numbers from the keyboard until 0 is read, count how many positive numbers are
Artyom0805 [142]

Answer:

import java.util.Scanner;

public class Solution {

   public static void main(String args[]) {

       compute_pos();

     }

     

     public static void compute_pos(){

     Scanner scan = new Scanner(System.in);

     int sum = 0;

     int counter = 0;

     // Prompt the user to enter an input

     System.out.println("Enter your value");

     // user input is assign to the variable value

     int value = scan.nextInt();

     

     while(value != 0){

         if (value > 0){

             sum += value;

             counter++;

         }

         System.out.println("Enter your value");

         value = scan.nextInt();

     }

     // Display the value of sum to the user

     System.out.println("The sum of the positive number is: " + sum);

     // Display the value of counter to the user

     System.out.println("The number of positive number is: " + counter);

   }

}

Explanation:

The first line import the Scanner class which allow the program to read input from the user. The class Solution is then defined. Then the main method which signify the beginning of execution in the program is defined. A method is called inside the main method.

The method compute_pos is defined. Inside the compute_pos method, a scanner object scan is declared to accept input from the user via the keyboard.

The variable sum and counter is declared and assigned to 0.

A prompt is displayed to the user to input a value. The user input is accepted and stored in the variable value.

Then a while loop is use to check the user input if it is not equal to zero. If it is equal to zero, the loop will end. Inside the loop, we first check to see if the user input is greater than 0, if it is, we add it to the variable sum and increase our counter by 1. At the end of the loop, a prompt is again display to accept input from the user.

Outside the loop, we display the sum and counter to the user.

8 0
4 years ago
What is this type of car?
Butoxors [25]
Nissan titan crew cab sv png
4 0
4 years ago
Read 2 more answers
An example of phishing is: Select one: a. flooding a web server with thousands of requests for service. b. setting up a fake med
tigry1 [53]

Answer:

Option(b) is the correct answer to the given question.

Explanation:

The main objective of the Phishing to posing as a legitimate entity and trick the individuals to sharing her confidential information like information of banking details such as credit card number  and passwords etc.

Phishing is done with the help of email, telephone or etc. Sometime phishing is done by the web page and stolen the website password. Phishing provides financial loss to the individual as well as the organization.

Except for option(b) all the options are not examples of Phishing that's why they are incorrect Options.

7 0
4 years ago
Read 2 more answers
Write a statement that adds 1 to the variable reverseDrivers if the variable speed is less than 0,adds 1 to the variable parkedD
Elina [12.6K]

Answer:

if speed < 0:

 reverseDrivers +=1

elif speed < 1:

 parkedDrivers +=1

elif speed < 40:

 slowDrivers +=1

elif speed<=65:

 safeDrivers +=1

else:

 speeder +=1

Explanation:

The statements are written in python programming language

See a complete code screenshot attached, where all the variables are defined

8 0
3 years ago
Other questions:
  • Questions 6 - 9 Refer to the following code: public class WhatsIt { private int[] values; private double average; public WhatsIt
    7·1 answer
  • Windows explorer has a pane located on the left side which can display the directory structure of one or more drives. what is th
    15·1 answer
  • What portable computing devices, designed for user convenience, have a sensor called an accelerometer that senses vibrations and
    10·1 answer
  • Sam needs to create a spreadsheet for his coworkers. They will need to follow across a long row of data. Sam would like to make
    8·2 answers
  • True or False: The correct answer to a numeric entry field will appear only if you click on the fields themselves after selectin
    12·1 answer
  • 4. What is the package name in which the Scanner class resides?
    14·1 answer
  • What is extraction, transformation, and loading? Group of answer choices It is a process of entering data, tracking data, and lo
    5·1 answer
  • Grades are numbers or ________ that show how a student performed in a course.
    7·2 answers
  • What are building blocks? Select three options.
    14·1 answer
  • What is the new subnet mask in prefix format?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!