1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tangare [24]
3 years ago
7

Hazel has taught herself a variety of computer languages. She enjoys using her knowledge to write the programs for applications

to use. Which of the following BEST describes the type of career that Hazel should pursue?
A.
computer programmer

B.
software developer

C.
systems analyst

D.
network architect

Reset Next
Computers and Technology
2 answers:
SOVA2 [1]3 years ago
4 0

Answer:

thank andrei750238

Explanation:

Python is a programming language created by Guido van Rossum. This programming language has an implementation in C and one of the most important facts about it is that it's easy to learn for beginners and is a very versatile tool.

It can be used for almost anything and it's easy to set up and run using the large number of libraries avaliable.

Some uses for Python are in :

- Machine Learning and AI

- Research and data interpretation

- BackEnd Server

- Simulations

- Games (?)

- Bots

- Simple automatization tasks.

Based on the large number of applications and the simplicity I think Python is one of the most valuable languages to learn.

Ber [7]3 years ago
3 0

Answer:

Hazel should choose computer Programmer as she can Program/ code on computers.or software developer.........Hope this helps...

You might be interested in
Cathy designed a website for a cereal brand. When users view the website, their eyes first fall on the brand name, then they vie
PSYCHO15rus [73]

Answer:

dominance

Explanation:

i just took it and got it right

4 0
3 years ago
Write a function checkPalindrome that accepts a single argument, a string. The function should return true (Boolean) if the stri
Vsevolod [243]

Answer:

Following are the program in the Java Programming Language.

//define function

public static boolean checkPalindrome(String str){

//set integer variable to 0

int a = 0;

//set integer variable to store the length of the string

int n = str.length() - 1;  

//set the while loop to check the variable a is less than the variable n

while(a<n)

{

//check the string character is not in the variable n

if(str.charAt(a)!= str.charAt(n))

//then, return false

return false;  

//the variable a is incremented by 1

a++;

//the variable n is decremented by 1

n--;

}

//and return true

return true;

}

Explanation:

<u>Following are the description of the following function</u>.

  • Firstly, we define boolean type public function that is 'checkPalindrome' and pass string data type argument 'str' in its parameter.
  • Set two integer data type variables that are 'a' initialize to 0 and 'n' which store the length of the string variable 'str' decremented by 1.
  • Set the While loop that checks the variable 'a' is less than the variable 'n', then we set the If conditional statement to check that the string character is not in the variable n then, return false.
  • Otherwise, it returns true.
5 0
4 years ago
1. What are the biggest risks when using the public Internet as a Wide Area Network (WAN) or transport for remote access to your
enyata [817]

Answer:

The problems or risk when using a WiFi is that, hackers often have the ability to position themselves between the user and the end point connection. and once these hackers gains access to your information and privacy, u might lose important documents or contents.

It is of utmost importance that when an end user is using a public WiFi as a WAN, he/she must ensure to browse with VPN turned on, and the sharing options turned off.

Explanation:

Solution

One of the biggest risk with public WiFi is the ability or capacity for hackers to position themselves between you (user) and the point of connection. so instead of communicating directly with the hotpot, at several times you end up sending your information to the hacker.

The hacker also have access or privileges to every information you send out such as credit card information, emails and so on. once the hacker gains access to that information, you run into trouble.

As an end user when making use of public WiFi to ensure to browse with VPN (Virtual private Network) on and turned off sharing options

4 0
3 years ago
6 external parts of computer
vivado [14]
<span>External computer parts are those that connect to the case, often to provide ways to input or output data.

Here are a 6 examples of external parts:
</span>Monitor
Keyboard
Mouse
Speakers
Printer
External Hard Drives

I hope this has helped you.
6 0
3 years ago
Read 2 more answers
Nancy needs to find the average of two numbers in the middle from an even count of numbers arranged in descending order. which s
Rus_ich [418]

i would say e. the median

7 0
3 years ago
Read 2 more answers
Other questions:
  • Write a program LotheryPrinter that picks a combination in a lottery. In this lottery, players can choose 6 numbers ( possibly r
    9·1 answer
  • "what are two elements found in an email address?"
    7·1 answer
  • The local emergency manager has the responsibility for coordinating emergency management programs and activities. A local emerge
    7·1 answer
  • Where do you access the status report of an assigned task that is open?
    12·2 answers
  • RAM that can be changed. True or False
    9·2 answers
  • c++ Project 6: Buoyancy. Buoyancy is the ability of an object to float. Archimedes’ principle states that the buoyant force is e
    13·1 answer
  • To control how and when the slides should appear during the slide show, we use the__________________ feature​
    12·1 answer
  • How to change the microsoft word pages to black background
    8·1 answer
  • Debugging 2.17.3: Debug: The Two Towers Code Hs
    15·1 answer
  • Project: Design and Development Research Project
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!