1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olga55 [171]
3 years ago
6

Is a list of instructions an arguments? Yes or No

Computers and Technology
2 answers:
grandymaker [24]3 years ago
7 0

Answer:

no actually. i think both are really different because instruction is a list of commands while arguments is a fight between two or more thoughts.

Bingel [31]3 years ago
5 0

Answer: yes

Explanation:

You might be interested in
How long is a subnet mask? (Please select one of the four options)
kolezko [41]

Answer: 32 bits

Explanation:

 The subnet mask basically contain 32 bits number which performed various function in terms of mask in the IP address. There are mainly two types IP address that are:

  • Host port
  • Network port

The 32 bit is the mask that is used for the host networking address in the single IP address. If the string represent 1, it means that the subnet mask is the part of the network.  

 

5 0
3 years ago
Which of the following does a code editor NOT provide?
qwelly [4]

Answer:

A- highlighting

Explanation:

plain code editor's don't provide them hope this helps

5 0
3 years ago
Write a static method named evenNumbers that accepts a string of text as a parameter. Assume that the text is a series of intege
Allisa [31]

Answer:

// Program is written in Java Programming Language

// Comments are used for explanatory purpose

// Import input/output and utility libraries

import java.io.*;

import java.util.*;

Declare class/

public class Numbers {

// Main method goes here

public static void main(String[] args) throws FileNotFoundException

{

// Read input from text file evenFile.txt; Assume file name is evenFile.txt

Scanner input = new Scanner(new File("evenFile.txt"));

// Call static method here

evenNumbers(input);

}

// Static method evenNumbers begins here

public static void evenNumbers(Scanner input)

{

// Declare and initialise Variables

String Nums = input.nextLine(); // Read all number in txt file

Scanner numbers = new Scanner (Nums);

int count = 0; // Number count

int evens = 0; // Even count

int sum = 0; // Summation of numbers

// Check if number is integer. If yes, continue the below operations

while (numbers.hasNextInt())

{

int num = numbers.nextInt();

count++;

sum = sum + num;

if(num % 2 == 0) // check for even

{

evens++;

}

}

System.out.println("Total numbers= " + count); // Print total number

System.out.println("Sum of numbers = " + sum); // Print summation of numbers

System.out.println("Total evens = " + evens); // Print total even

//Calculate and print percentage of even number

double percent = ((double)evens/count)*100.0);

System.out.println("Percent of even number = " +percent);

}

}

// End of program

8 0
3 years ago
Read 2 more answers
In a(n) ____ design, the remote user's keystrokes are transmitted to the mainframe, which responds by sending screen output back
Harrizon [31]

Answer:

I think it would be centralized

4 0
3 years ago
Identify the components of the enveloped virus budding process
Elina [12.6K]

The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

<h3>What is the case of the virus about?</h3>

Virus budding in general is known to be a term that connote the scattering or disturbance of a cellular membrane and it is one away from the cytoplasm.

Note that it is said to be the envelopment of the viral capsid and this is done by one or more lipid bilayers that can be seen in the viral membrane glycoproteins, and it is one where a fission event takes place.

Hence The components of the enveloped virus budding process are:

  • lipid bilayers
  • fission event
  • Glycosylated (trans-) membrane proteins.

Learn more about virus from

brainly.com/question/26128220

#SPJ1

3 0
2 years ago
Other questions:
  • Which sentences in the passage show the preventive measures to avoid data breach?
    9·1 answer
  • Which of the following symbols is used to convert a number to text?
    11·1 answer
  • If an individual column is listed in a SELECT clause, along with a group function, the column must also be included in a(n) ____
    12·1 answer
  • Robert's employer has agreed to pay half the tuition for Robert to complete his college degree. This benefit is known as what?
    7·2 answers
  • Which of the following is not System Software?
    5·1 answer
  • Which of the following is the best example of an installation issue
    11·2 answers
  • Any song recommendations, pls dont say 6ix9ine or lil pump
    5·2 answers
  • Lists are indexed by an ________. a. float b. integer c. string d. All of the above​
    8·1 answer
  • PLEASE ANSWER IN COMPLETE SENTENCES - JOURNALISM, 30 POINTS
    11·2 answers
  • What is the importance of test documentation?
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!