What classes should I take in high-school for majoring in computer science?

Answers

Answer 1

Answer:

Computer science are the disciplines that study information, computing and the applications or ecosystems where they are developed. It is a science that comes from applied mathematics and has 3 branches that are quite well known. On the one hand we have software engineering, secondly theory as such (primary study of algorithms and data, etc.) and finally the application of the amalgam of the first two, which end up resulting in disciplines such as big data, cybersecurity or computer security, machine learning, artificial intelligence, etc. However, we are talking about a very broad science with various branches of work. Technological advances that have improved the scope of education, now allow us to develop in specific skills and computer science is one of the macro careers that have benefited the most thanks to the diversity of subjects it encompasses. This is where the on-demand courses available on the edX platform come in. Computer scientists are in one of the best times for their career advancement. We invite you to be part of the technological development and information and computing technologies through online courses.

Explanation:


Related Questions

Use the drop-down menus to complete the steps for filtering records in a form.

1. Open the (1) tab.

3. In the Sort & Filter group, click (2), and click Filter by Form.

4. Enter or select a value to set the filter.

5. On the Home tab, in the Sort & Filter group, click the (3) button to toggle the filter.


1= create, database tools, file, home

2= advanced, filtering, find, new

3= ascending, descending, apply filter, toggle filter

Answers

Answer:

Home, advanced, apply filter

Explanation:

edge 2021

In the completion of the steps for filtering records, one can:

Open the Home tab.click (advanced), and click Filter by Form.click the (apply filter ) button to toggle the filter.  

What is filtering of records?

Filtering is know to be a very vital methods that is used  to see only the data that a person want to be shown in Access databases.

Conclusively, By following the steps above, one can achieving the filtering of the records that they desires.

Learn more about filtering records from

https://brainly.com/question/22238933

#SPJ1

help plz its do today

Answers

Answer:

It is a good idea to consider supply and demand when considering your future career. This will give us an idea of how easy or difficult it is to enter the area and make a living from it.

Explanation:

Maria is writing a program to design t-shirts. Which of the following correctly retrieves the values for a t-shirt object's pattern?

newStyle.pattern
newStyle + pattern
newStyle = pattern
newStyle(Pattern):

Answers

Answer:

newStyle.pattern

Explanation:

example:

class Style:

    def __init__(self, pattern=""):

def design():

    newStyle = Style (this allows the user  to user newStyle to access all values in the class Style)

    now that you have this, you can call the pattern attribute

    newStyle.pattern

    you can also set this equal to a new value here but for the sake of this question your answer is newStyle.pattern

hope this made sense and helped you out! :)

   

Which three phrases describe a wireframe?
Tracy uses a pictorial summary of an entire website in her team meeting. It is a two-dimensional illustration of how each web page on a website will look. Known as a workflow diagram, this explains how pages in a website connect to one another. It is a design tool, and it shows the overall framework of a website. It is a visual representation of how much space each element on a page should take.

Answers

Answer:

A wireframe is best described by the phrase;

It is a design tool, and it shows the overall framework of a website

Explanation:

A wireframe is meant to provide a visualization for a page in a form of blue print that defines a websites structure thereby aiding the communication and thought process among those concerned in the website development process, including the programmers, developers and website designers

The wireframe is a depiction of the website, that points out the intended location of content, the layout and how navigation and functions that are to be included on a page in a way that is easily adjustable

The wireframe is therefore a representation of the skeletal framework of the website

Answer:

i only know two and they are design tool and shows the overall frame work of a website

Explanation:

plato

A collection of entries posted on a web site and displayed in reverse chronological order (from newest to oldest entries), is known as: А social collaboration. B media sharing. С a blog D a tweet.​

Answers

A) Social Collaboration

Social Collaboration is a way for people to combine their information and make it easier to go through and to work well as a team.

what is the goal of keyboardding technique

Answers

Answer:

to get faster at typing

Explanation:

After you create a pie chart, you can move it to its own chart sheet.
True or False.

(Microsoft Excel)

Answers

Answer:

I think it's either true or false

Explanation:


This describes what is charted. It can be placed above or below the chart.
a. Chart area
b. Chart title
C. Bar chart
d.Pie chart

Answers

Answer:

a . chart area

This describes what is charted. It can be placed above or below the chart.

Explanation:

The answer choice which describes what is charted and can be placed above or below the chart is:

A. Chart area

According to the given question, we are asked to show the answer choice which describes what is charted and can be placed above or below the chart

As a result of this, we can see that a chart area is an area in a graph which shows the quantitative data in a graphical form and it is based on the concept of line chart and can be placed either above or below the chart.

Therefore, the correct answer is option A

Read more here:

https://brainly.com/question/18524966

what is web technology?​

Answers

Answer:

Web technology refers to the means by which computers communicate with each other using markup languages and multimedia packages. It gives us a way to interact with hosted information, like websites.

Answer:

Web technology are the various tools and techniques that are utilized in the process of communication between different types of devices over the internet.

Jason would like to add visual representations to a table that will be used to easily show comparison data. Which option should he use?

conditional formatting
data bars
expression builder
field criteria

Answers

Answer:

a. conditional formatting

Explanation:

WHAT DOES THE SCRATCH CODE BELOW DO?

Answers

Answer:

the first one

Explanation:

What is digital scavenger hunting? A. An application that locates addresses B. A scavenger hunt where players use GPS and digital cameras C. A game like Marco Polo on the Internet D. A way of tracking criminals using GPS​

Answers

Answer:

C. A game like Marco Polo on the Internet

Explanation:

A digital scavenger hunt is a name for a scavenger hunt game originally made for mobile phones and works on any operating system or mobile platforms such as Android or iOS.

The game comprises of different missions in which players are expected to complete one after the other.

Hence, in this case, the correct answer is "A game like Marco Polo on the Internet."

Choose the correct line of code.

To overload exponentiation, use

•def_power__(self, b):
•def_power_(self, a, b):
•def_pow_(self, b):
•def_pow_(self, a, b);

Answers

Def_pow_(self,b): if not then I’m sorry

Answer: def_pow_(self,b)

Explanation: got it right on edgen

A salesman has been traveling to different businesses all day to give a sales presentation. Each time, he was starts up his laptop and logs into Windows to show his PowerPoint presentation to the customer. During his second appointment, his laptop lost power and shut itself off abruptly. He arrives at his third appointment and plugs in his laptop to recharge it. When he powers on his laptop, he sees a very low resolution version of his normal desktop. He attempts to change the resolution from 800 x 600 to 1920 x 1080 (his normal resolution), but cannot find it in the Display Settings options inside of Windows. Which of the following could be the cause of this error?
A. Corrupted or missing display driver
B. Graphic card failure
C. Corrupted motherboard firmware
D. Corrupted memory module

Answers

Answer:

A. Corrupted or missing display driver

Explanation:

The most likely reason for this problem would be a corrupted or missing display driver. The display driver is in charge of grabbing the information from the graphic card and adjusting all the necessary settings so that all of the graphic card's power is able to be utilized. Missing or corrupt drivers can cause errors such as laggy display, wrong resolution/minimum resolution, missing display settings, etc. A graphic card failure on the other hand would show no image on the screen whatsoever when turning on the computer.

What can help you take better animal photographs?

Use a lower ISO.
Focus on the animal's nose.
Be ready to catch the shot.
All of the above

Answers

Answer:

All of the above

Explanation:

i think i may be wrong.

Answer:

be ready to take the shot

Explanation:

Using the information below, answer the question to the right. Which function should you use to extract shipping values from the Lookup Table?

Answers

Answer: HLookup

Explanation:

HLookup is a function in Microsoft Excel that is part of the Lookup functions, that is, it is used to lookup a value from another table or cell so that it reflects in the desired table.

The “H” in the HLookup stands for Horizontal, that is Horizontal Lookup.

The HLookup function works by looking for a value in the top row of a table or array of values and returning the value in the same column from a row that is specified.

The function is;

=HLOOKUP(lookup_value, table_array, row_index_num, [range_lookup])

So, to extract our shipping value from the lookup table, we use the formula;

=HLOOKUP(C2,$B$11:$E$12,2)

Which wizard is a tool provided by Access that is used to scan the table’s structure for duplicate data?

Query Design Wizard
Table Design Wizard
Table Analyzer Wizard
Performance Analyzer Wizard

Answers

Answer:

Table Analyzer Wizard

Explanation:

I made a fish emoji what do you think >{'_'}< should I change anything

Answers

Answer: It is beautiful

Explanation:

☁️ Answer ☁️

666/69 I like it. : )

What is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
PopWhat is a method that deletes an item from a list using the item’s value?
Remove
Delete
Erase
Pop

Answers

Answer:

Remove

Explanation:

A method that deletes an item from a list using the item’s value is "Remove"

The "remove () function in python language indicates the specific element or character to be that needs to be removed.

For example

myList = ["Jane",16,34,52,"Lamar",13,27,20]

myList.remove(34)

myList

OUTPUT : ["Jane",16,52,"Lamar", 13,27,20]

Therefore, by printing the list using the print(), we can observe that the element 34 has been removed from myList.

Hence, the correct answer, in this case, is " Remove."

Cybersecurity breaches in the workplace generally happen because _____. Select 3 options.


people make unintentional mistakes


people do not know about cybersecurity protocols


workplaces tend to have too strict cybersecurity protocols


cybersecurity specialists do not really help


people deliberately try to hack into the network

Answers

Answer:

people make unintentional mistakes

people do not know about cybersecurity protocols

people deliberately try to hack into the network

Explanation:

Cyber security breaches are the compromise to the data integrity of a computer system or network. There are several reasons why this can happen in the network f an organization. Some of them include;

1. People make unintentional mistakes: Human error has been attributed to be the leading cause of cybersecurity breaches. When people unknowingly expose passwords and sensitive data to those who should not have access to them, they commit a breach of security.

2. People do not know about cybersecurity protocols: When people are not educated on the right security measures to adhere to, they are prone to unknowingly engage in acts that will lead to a security breach.

3. People deliberately try to hack into the network: People within and outside the organization can decide to compromise the network especially if they believe that they will have some financial benefits.

The____
mode is generally used when delivering a presentation to an audience.

Slide
Auto
Default
Window.

Answers

Answer:

Default

Explanation:

The four modes of delivery— memorized, impromptu, manuscript, and extemporaneous—are all valuable in group presentations. However, the most common mode of delivery is extemporaneous.

Default would be the correct answer.

Choose the type of collection described.

A ___ uses square brackets. You use append to add to the collection.
A ___ uses curly brackets. You use update to add to the collection.
A ____ uses parentheses. You cannot change it once you create it.

Answer choices for all three:
•List
•Tuple
•Dictionary

Answers

Answer:

1) List

2) Dictionary

3) Tuple

Explanation:

A list uses square brackets. It is used to store multiple items in just one variable. They are usually changeable and give room for duplicates. You use append to add to the collection.

A dictionary uses curly brackets. You use update to add to the collection. A dictionary is created by placing the elements in curly brackets and separating them with a comma. It is changeable and it does not give room for duplicates.

A tuple uses parentheses. You cannot change it once you create it. It is an ordered list of elements that is finite and can also store multiple items in one variable.

Choose the best function for the purpose.

___ You need a collection to grow. Once you have all the data values, you will pass the collection to a function for
processing.

___ You will store a set of data that will not change.

Answers

Answer:

LIST: You need a collection to grow. Once you have all the data values, you will pass the collection to a function for processing.

TUPLE: You will store a set of data that will not change.

Explanation:

EDGE 2021 answers came from the actual reading. Here's the definition Edge provides for a list: "Lists are probably the most commonly used type of collection. A list can grow as you add values to it. You could use a list to quickly save those values and then pass the list to a function for processing."

With all those bolded words, you see list is the answer for that first blank.

Here's the definition Edge provides for tuple and how it proves deque is the WRONG answer: "Lists and deques are mutable—you can change them. "Tuples are immutable (can't change). Tuples are a good choice when you know that, once created, you will not need to change the values in a tuple. The only way to change the values in a tuple is to create a new tuple with the new values. "

Which of the following is not a key component of a structure?
A. Name
B. Properties
C. Functions
D. Enumerations

Answers

D. Enumerations! Because I know that is NOT a leg compentent of a structure

14 points, what is an IP v4 packet??

Answers

Answer:

Internet Protocol version 4 (IPv4)

Explanation:

is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.

Answer:

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP). It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 was the first version deployed for production on SATNET in 1982 and on the ARPANET in January 1983.

Explanation:

Create a function called biggestNum that returns the largest number in an array of integers. The function is passed only one parameter, an array. In main, ask the user the input eight integers. Each integer should be added to an array called nums. Then, call the function and output the largest number in the array.

Answers

This is for Python

def biggestNum():

   array = []

   for i in range(8):

       number = int(input('Enter number: '))

       array.append(number)

   

   return max(array)

print(biggestNum())

Hurry I’m timed

What is one purpose of an algorithm?

to reduce error
to show how to use a computer
to eliminate step-by-step instructions
to eliminate smaller tasks

Answers

A to reduce error...........

Answer:

an algorithm completes step by step tasks

Explanation:

the last option could work too but step-by-step is more accurate to what an algorithm is.

System where energy is used to move people is a what system

Answers


Energy is not consumed by motion. And since motion is relative, that means the amount of energy is relative to reference frame.

HOW DO YOU RUN YOUR SCRATCH PROGRAM?

Answers

Answer:

By clicking on the green flag, it starts up the program and if you want to stop it use the stop sign.

To run your scratch program you have to click the green flag, and it will run your program.

Hope that helps.

Sometimes it is necessary to_ after installing a new software program and before using it the first time.

Answers

Answer:

The answer is "restart your computer".

Explanation:

Installing the new software programs with system drivers and plug-ins would be the ready-to-execute software. It refers to a particular installation of a device or hardware to enable its computer functional. Since downloading a new software program and using it first, you often have to restart your computer.

Answer: restart your computer

Explanation: took the quiz

Other Questions
72 in.= ______ yd.yd.=yardsin.=inchesHOW MANY YARDS ARE IN 72 INCHES? HOW DO I SHOW MY WORK FOR THAT???!!!!!correct=brainliest what is Philippine constitution? What did the people name Caesar when he marched into Rome?When did the Republic end?What did the two consuls do? in ancient romeWhat is a republic? in the ancient rome don't waste my points if you don't know pleaseee helpp ASP 13) Which set of values is a function?* Im so stuck please help smart people ahahah -example of omnivore Is this function odd? Graph the Systems of Equations below, then place a point indicating the solution to the system of equations. Use the course calculator to solve this problem:8 + 17 26 hii please help ill give brainliest WILL GIVE BRAIN IF CORRECT What is the value of x in the equation (x/5) - 1 = 5.2I need the work btw Classify the triangle by its sides:17 cm, 5 cm, 13 cm? Guys pls help me!!!!!!!! Infer why Merlin looks at Dori's scar and then decide to talk to the "fish"? 4=2/9x A) 6 B) 9 C) 15 D) 18 Pension data for Coda Corporation included the following for the current calendar year: Service cost $ 112,000 PBO, January 1 810,000 Plan assets, January 1 860,000 Amortization of prior service cost 6,600 Amortization of net loss 2,600 Discount rate, 8% Expected return on plan assets, 10% Actual return on plan assets, 12% Required: Determine pension expense for the year. (Amounts to be deducted should be indicated with a minus sign.) What are some whole, fossilized animals preserved in? Please help quick please The diagram shows the life cycle of a pine tree. What does stage 4 show?