Based on the code you created in this Unit, propose a way to re-use most of the code (with different information in the variables like "city" and "rates") for a part of a similar app that isn't related to parking at all. The app can be small-scale or large scale, but should be clearly connected to the code you've written (you can defend your proposal if the connection is not immediately obvious).

Answers

Answer 1

Answer:

Is this a question or an answer


Related Questions

It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Answers

Answer:

Communication.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

what is the example of HTML?​

Answers

Answer:

For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data table

A simple circuit consists of a battery, an ammeter and a 2-ohm resistor. If the ammeter reads 4 amperes, determine the voltage of the battery and enter in the appropriate space.

Answers

Resistance=2ohmCurrent=I=4AVoltage=V

Using ohms law

[tex]\boxed{\sf \dfrac{V}{I}=R}[/tex]

[tex]\\ \sf\longmapsto V=IR[/tex]

[tex]\\ \sf\longmapsto V=2(4)[/tex]

[tex]\\ \sf\longmapsto V=8V[/tex]

why is computer virus called destructive program​

Answers

Answer:

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

Viruses which are the most commonly-known form of malware and potentially the most destructive. A virus can do anything from erasing the data on a computer to hijacking a computer to attack other systems, send spam, or host and share illegal content.

Explanation:

The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally because they are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Some viruses wreak havoc as soon as their code is executed, while others lie dormant until a particular event (as programmed) gets initiated, that causes their code to run in the computer. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected email attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.  

Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comparisons between different values and not just relative comparisons. (c) the values being displayed have different units or very different magnitudes. (d) the reader need not differentiate the columns and rows.

Answers

Answer: (c) the values being displayed have different units or very different magnitudes

Explanation:

A table is refered to as an arrangement of data in rows and columns. Tables are used in research, communication, and data analysis.

Tables are used in the organization of data which are too complicated or detailed to describe and the use of table give a clearer description. Tables should be used when the values being displayed have different units or very different magnitudes. Tables can also be used in highlighting patterns or trends.

In what ways can technology help you be more productive? (Select all that apply.)
Enables you to create electronic documents that present your ideas clearly and effectively
Enables you to communicate with people anywhere in the world
Enables you to store documents on a thumb drive
Enables you to eliminate procrastination habits

Answers

Answer:

Enables you to create electronic documents that present your ideas clearly and effectively.

Enables you to communicate with people anywhere in the world.

Enables you to store documents on a thumb drive.

Explanation:

Technology is the use or application of scientific knowledge to the way we live life. In other words, we can say that technology is the branch of knowledge that deals with the use of technical means in everyday life.

One of the ways that technology can help people be more productive is that it enables one to create electronic documents that clearly and effectively present one's ideas. It also helps in the communication process, especially in between long distances. Added to that, technological use also enables us to store documents on a thumb drive and enables easy transfer of documents and files.

Thus, the correct answers are the first, second, and third options.

Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)


Select all that apply

A

game designer


B

network engineer


C

graphic designer


D

cashier

Answers

Answer:

not d

Explanation:

IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)

Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tells multi-functioning capability of computer. c.The first calculating machine designed for the manipulation of census data. d.The first computer programmer.​

Answers

Answer:

a) Application software

d) Lady Augusta Ada Lovelace

b) (it may be versatility

ou have a company network that is connected to the internet. You want all users to have internet access, but you need to protect your private network and users. You also need to make a web server publicly available to internet users. Which solution should you use

Answers

Server and network is 2 different things, just put the server on a different network.  ;) duh

Explanation:

What is ABC computer?​

Answers

Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.

Explanation:

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer

Answers

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.

Answers

Answer:

True

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.

you’ve found an image you want to insert into your slide presentation you want to make the image look more gray so that it looks like an older image what would you need to adjust

Answers

image grayscale

format : format options: recolor : then pick the color

Explain What Peer to Peer Networking is.

Answers

Answer:

peer to peer networking is like when joining together works

Which of the following statements is true about scalability? Choose 3 options.

Horizontal scaling has fewer limits than vertical scaling.

Scalability refers to the ability of hardware components to increase their capacity.

Scalability should be considered very early in the project.

The cloud offers services to automatically scale your system and balance the workload between components.

An example of vertical scaling is adding a new server to the network.

Answers

Answer:

Horizontal scaling has fewer limits than vertical scaling.

The cloud offers services to automatically scale your system and balance the workload between components.

Scalability should be considered very early in the project.

Explanation:

Hope this helps :) If not, please let me know what answers are wrong

The statements that is true about scalability are:

The clouds provide resources to scale the system and balance the workload between components

Scalability should be considered at the beginning of the project.

Horizontal scaling has fewer limits than vertical scaling.

Horizontal scaling is a type of scaling by adding more machines to your po of resources.

It is also called adding more power.

The difference between scaling up and scaling out is that horizontal scaling simply adds more machine resources to your existing machine infrastructure.

Vertical scaling is simply known to adds power to your existing machine infrastructure by increasing power from CPU or RAM to existing machines.

Conclusively, Scalability part of a system that handle a growing amount of work by adding resources to the system.

Learn more from

https://brainly.com/question/17661222

the paint 3D program is used for drawing picture true or false​

Answers

Answer:

The answer is TRUE we use paint program to draw.

Explanation:

#swag

Answer is truee the paint 3d program is used for drawing pics

When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequence as the parameters b. must have data types that are compatible with the parameters c. have the same names as the parameters d. all of the above e. a and b only

Answers

Answer:

a and b only

Explanation:

If you have a function foo(int a, double b) { } you can call this as foo(x,y), just as long as x is an int and y is a double.

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

how do I answer question

Answers

Answer:

To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.

Explanation:

Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.

what allows an individual or company to share a post with an audience however they are designed to be used with mobile devices and limit the size of posts

Answers

Answer:

E-mail

Explanation:

The sending of messages via the Internet is known as e-mail. It is one of the most often utilised functionalities for sending text, files, pictures, and other attachments across a communications network.

A podcast lets a person or corporation to share articles with an audience, but it is geared for usage on mobile devices and has a capacity restriction.

Define Artificial Intelligence(AI) in 5 sentence​

Answers

Answer:

Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think like humans and mimic their actions. ... The ideal characteristic of artificial intelligence is its ability to rationalize and take actions that have the best chance of achieving a specific goal.

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

What is the base value of the number system that consist of the digit set {0, 1, 2, 3, 4, 5, 6, 7}?

(a) Two
(b) Eight
(c) Sixteen
(d) Seven

Answers

Answer:

B. Eight because octal number system has eight elements

Greg has a list of payments for goods brought every month for the years 2009,2010,2011, and 2012. He needs information from only the last three years. He can filter this by clicking on

Answers

Answer:

"2009" and clicking "does not equal 2009"

Explanation:

The operator, 'does not equal', is a filtering operator used to exclude a specified attribute. The 'does not equal' operator is also used to provide the definition of the condition of the filter given that there are different values of two attributes

Therefore, given that there are only four years, and Greg needs the information of the last three years, which are, 2010, 2011, and 2012, the information for the year 2009 is to be excluded

Therefore, the correct option is; "2009" and clicking "does not equal 2009"

16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.

Answers

Answer:

A) A function can hold multiple return statements, but only one return statement executes in one function call

Explanation:

This is because each function can only return one value, whether it be an integer, String, or other object.

However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.

Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.

Hope this helps!

The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.

The following information should be considered:

This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.

Therefore, we can conclude that option A is correct.

Learn more about the function here: brainly.com/question/12431044

Define Data communication​

Answers

Explanation:

Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses. 

are the exchange of data between two devices For data communications to occur, the communicating devices must be part of a communication system made up of a combination of hardware

donde veo haikyuu en español sin lag ni virus :C (la segunda, tercera y cuarta temporada)

Answers

Answer:

keep in English language

Explanation:

keep in English

Pratibha is working in a bank. She is creating a database to store the details of the bank customers. Which of the following fields of table Bank_Customer can be selected as primary key?​

Answers

Answer:

Acc_No

Explanation:

Given

See attachment for table Bank_Customer

Required

Which field can be used as primary key

A field, once made the primary key, cannot contain duplicate entries.

This means that Pratibha has to select a field that can be unique to all customers.

From the table, we have:

Acc_No [tex]\to[/tex] No two customers can have the same account number

Cust_Name [tex]\to[/tex] Multiple customers can have the same name

DOB [tex]\to[/tex] Multiple customers can have the same date of birth

PAN_NO [tex]\to[/tex] No two customers can have the same pan number; however, pan number is often issued by tax department of a country.

Opening_Bal [tex]\to[/tex] Multiple customers can have the same opening balance,

Hence, the field to use as primary key is:

Acc_No

who is the father of computer​

Answers

Answer:

Charles babbage is the father of computer

Explanation:

Charles Babbage is a father of computer

Other Questions
Plzz helpThe Libertarian Party is an example of which of the following? O a protest party Oa single-issue party O a breakaway party Oan alternate party QUESTION 11 1. Through PCR, we have determined the PER3 genotypes for a class of students as follows: H4/H4 = 125 individuals; H4/H5 = 85 individuals and H5/H5=24 individuals. Using the allele's frequencies experimentally derived, calculate the frequency of the H4/H5 genotype that would be expected if the class were a population in Hardy-Weinberg equilibrium. 1. 0.28 2. 0.51 3. 0.19 4. 0.72 5. 0.14 6. 0.24 7. 0.41 QUESTION 12 1. Through PCR, we have determined the PER3 genotypes for a class of students as follows: H4/H4 = 125 individuals; H4/H5 = 85 individuals and H5/H5=24 individuals. Using the genotype frequencies derived assuming that the class were a population in Hardy-Weinberg equilibrium, calculate the number of H4/H4 individuals that would be expected in the class (rounded numbers). 1. 19 2. 57 3. 72 4. 147 5. 171 6. 120 7. 96 QUESTION 13 1. Through PCR, we have determined the PER3 genotypes for a class of students as follows: H4/H4 = 125 individuals; H4/H5 = 85 individuals and H5/H5=24 individuals. Considering the Hardy Weinberg equilibrium and comparing the observed and the expected number of individuals for the three genotypes, calculate the value of the Chi-square statistic 1. 2.69 2. 0.05 3. 28.67 4. 14.59 5. 0.50 6. 22.31 7. 3.84 QUESTION 14 1. Through PCR, we have determined the PER3 genotypes for a class of students as follows: H4/H4 = 125 individuals; H4/H5 = 85 individuals and H5/H5=24 individuals. Considering the Hardy Weinberg equilibrium, which is the (correct) null hypothesis tested by Chi-square? 1. The whole class represents a population that is in Hardy-Weinberg equilibrium 2. The whole class represents a population that may not be in Hardy-Weinberg equilibrium 3. The whole class represents a population that is not in Hardy-Weinberg equilibrium 4. The whole class represents a population that may be in Hardy-Weinberg equilibrium QUESTION 15 1. Through PCR, we have determined the PER3 genotypes for a class of students as follows: H4/H4 = 125 individuals; H4/H5 = 85 individuals and H5/H5=24 individuals. Considering the Hardy Weinberg equilibrium and calculating the Chi-square statistic, do you reject or fail to reject the null-hypothesis? 1. Comparing the value of Chi-square that I calculated with the critical value of Chi-square for the appropriate degrees of freedom I conclude that P>0.05. Hence, I reject the null hypothesis. 2. Comparing the value of Chi-square that I calculated with the critical value of Chi-square for the appropriate degrees of freedom, I conclude that P>0.05. Hence, I fail to reject the null hypothesis. 3. Comparing the value of Chi-square that I calculated with the critical value of Chi-square for the appropriate degrees of freedom I conclude that P What is the solution to this inequality?X-7>-6O A. X-13O C.x>1O D x< 1 What are some hooks for a persuasive essay on Outsourcing?How do i make a hook?!? PLEASE ITS DUE IN 10 MIN!! I NEED HELP!!! What mass of precipitate (in g) is formed when 250.0 mL of 0.150 M CuCl is mixed with excess KOH in the following chemical reaction?CuCl(aq) + 2 KOH(aq) Cu(OH)(s) + 2 KCl(aq) All of my friends like fruit. 9 friends like bananas, 8 friends like oranges, and 7 friends like plums. 5 friends like both bananas and oranges, 3 friends like both bananas and plums, 4 friends like both oranges and plums, and 2 friends like bananas, oranges and plums. How many friends do I have? the train regularly travels 135 miles in 60 minutes.What is the speed, in miles per minute, on this portion of the route? What was the response of the world's nations to the Great Depression? please I need help here Explain relationship of cells,tissues,organs and system How many of each coin does he have?_____nickels_____quarters which of the statement is true 24. The two primary types of ocean currents are mJWL=87 degrees. Find the value of x. RSM wants to send four of its 18 Math Challenge teachers to a conference. How many combinations of four teachers include exactly one of either Mrs. Vera or Mr. Jan? A lady wearing a McDonalds t-shirt with a delicious-looking Big Mac on it asks which fast food restaurant is your favourite. This leads to which type of bias?a) Response Biasb) Sampling Biasc) Measurement Biasd) Non-response Bias translate the book into spanish Determine the amount of money in a savings account at the end of 1 year, given an initial deposit of $12,000 and a 4 percent annual interest rate when interest is compounded: Use Appendix A for an approximate answer, but calculate your final answer using the formula and financial calculator methods. (Do not round intermediate calculations. Round your final answers to 2 decimal places.) When a charged particle moves at an angle of 26.1 with respect to a magnetic field, it experiences a magnetic force of magnitude F. At what angle (less than 90o) with respect to this field will this particle, moving at the same speed? Select the correct answer.What is an advantage of discussing a topic or complex task with a group?OA.It makes you maintain a specific role throughout the discussion.OB.It shows you how to follow group discussion instructions.O C.It allows you to explore points of view that differ from your own.OD.It gives you an opportunity to have a conversation with friends.