When this function is called, the smaller of two numbers is displayed. What Boolean expression would not work in line 12 in order to accomplish this goal?

Answers

Answer 1

Answer:

[tex]\mathbf{num1 == num2}[/tex]

Explanation:

The missing program is written as:

1 var [tex]num1[/tex] = 5;

2 var [tex]num2[/tex] = 7;

3 smallest ( ) ; →

4

5 [tex]num1[/tex] = 8;

6 [tex]num2[/tex] = 4;

7 smallest ( ) ; →

8

9 function  smallest ()  {→

10    [tex]console.log[/tex] ( "What is smallest? " +[tex]num1[/tex] +  " or  " +  [tex]num2[/tex]  +  " ? " ) ;

11

12     if (< insert code>)  {

13     [tex]console.log[/tex]([tex]num1[/tex] + " is the smallest.") ;

14     } else {

15     [tex]console.log[/tex]([tex]num2[/tex] + " is the smallest.") ;

    }   

 }

So from above, the Boolean expression that would not work in line 12 is:

[tex]\mathbf{num1 == num2}[/tex]

Answer 2

The Boolean expression would be a logical assertion that is either TRUE or FALSE. It may compare the data of any type as long since both components of an expression have the same basic data.

This information can be tested to discover whether it is equal to, larger than, or less than another data.In the attached file, except "num1 == num2" all choices are correct because it uses the less than and greater than (>,<) Operator which is used to compare the value.

Therefore, the answer is "num1 == num2".

Please find the complete question in the attached file.

Learn more:

brainly.com/question/20076842

When This Function Is Called, The Smaller Of Two Numbers Is Displayed. What Boolean Expression Would

Related Questions

which responses would you use for a computer or electronic medical record outage? (select all that apply)

Answers

The responses that a person need to use for a computer or electronic medical record outage is option A: Verify computers, printers, and WOWs are plugged into red outlets.

What are the problems with electronic medical records?

In regards to  computer or electronic medical record, there are sometimes where there is found to be some outage.

Note that  based on  USF Health, some key healthcare givers and patients can be very concerned in regards to  medical privacies if they are using EHRs.

Note that some of the concerns includes the lost information as a result of a natural disaster as well as cyber hacks.

Hence, The responses that a person need to use for a computer or electronic medical record outage is option A: Verify computers, printers, and WOWs are plugged into red outlets.

Learn more about medical record from

https://brainly.com/question/21819443

#SPJ1

See full question below

5. Which responses would you use for a computer or electronic medical record outage? (select all that apply)

Verify computers, printers, and WOWs are plugged into red outlets.

Reset equipment, if needed, by turning on and off.

Locate downtime forms and use if directed.

Verify critical patient care equipment is functioning properly.

Refer to downtime computer and printer on unit.

Use red emergency phones.

display campaigns use full automation to optimize and automate nearly all aspects of the campaigns. users only have to provide a few inputs. what can a user input in a display campaign?

Answers

A user can input the following in a display campaign: D. the images they wish to use.

What is a display campaign?

A display campaign can be defined as a form of online advertisement that typically involves the use of banner adverts (ads) alongside other digital visual adverts to advertise their product on social media platforms, software, or websites, to existing customers and  potential customers.

In this context, we can reasonably infer and logically deduce that an end user can input the images he or she wishes to use in a display campaign.

Read more on display and advertisement campaign here: https://brainly.com/question/25710825

#SPJ1

Complete Question:

Display campaigns use full automation to optimize and automate nearly all aspects of the campaigns. users only have to provide a few inputs. What can a user input in a display campaign?

All channels they wish to target

A maximum conversion number

Keyword bids and modifiers

The images they wish to use

how can I download music and films at home without breaking the law?
Plz help I will give brainliest ​

Answers

Answer: use a legal music downloader

Explanation: :)

Answer:

Paying for those music and movies.

Explanation:

If you pay for them, you are pretty much an "owner" of those materials and there is no way you can get in trouble. Now, however, you can use services such as Spotify, Netflix, and many more as those companies have bought the rights to stream those at a cheaper price for people.

Hope this helps!

now suppose that the mp3 file is broken into 3 packets, each of 10 mbits. ignore headers that may be added to these packets. also ignore router processing delays. assuming store and forward packet switching at the router, the total delay is

Answers

It is often assumed that the delay in store and forward packet switching is negligible. However, this is not always the case, as seen in the example above.

The total delay for the three packets to be processed was 4.05 seconds. This can be attributed to the processing time at the router, as well as any headers that may be added to the packets.

While this may not seem like a significant amount of time, it can add up, especially if there are multiple packets to be processed. In general, store and forward packet switching is a reliable way to route data, but there can be delays involved that should be taken into account.

Learn more here:

https://brainly.com/question/24812743

#SPJ4

PLEASE ANSWER CORRECTLY
Which type of loop is best in each situation?


for or while ? : You know ahead of time how many passes you wish to make through a loop.

for or while ? : You do not know ahead of time how many passes you wish to make through a loop.

Answers

Answer:

a

Explanation:

E

Answer:

1:for

2:while

Explanation:

Why might we use abbreviations when sending messages?What are the advantages

Answers

Answer:

Abbreviations help you write faster when you're in a hurry and save time. They also help you when you take notes in class.

Explanation:

Hope It Helps

Sorry If I'm Wrong

most widely deployed cellular communications standard, relatively slow data transfer, 2g technology.

Answers

The most widely deployed cellular communications standard GSM, is relatively slow data transfer, with 2g technology.

With its availability in more than 210 countries worldwide, GSM, or Global System for Mobile Communication, was once regarded as the industry standard for communication, notably in Asia and Europe.

The switching system (SS), base station system (BSS), and operation and support system are the three main systems that make up the GSM network (OSS).

A mobile network operator that makes use of the cellular Global System for Mobile communications is known as a GSM carrier. GSM carriers like AT&T and T-Mobile offer service for GSM phones, whereas CDMA carriers can only work with CDMA-compatible phones.

3G, 4G, and 5G have developed from the GSM (2G).

Learn more about communication:

https://brainly.com/question/26152499

#SPJ4

an administrator deploys a basic network intrusion detection system (nids) device to identify known attacks. what detection method does this device use?

Answers

When an administrator deploys a basic network intrusion detection system (NIDS) device to identify known attacks, the detection method used by this device is signature-based.

The types of detection methods.

In Computer technology, the detection methods used by an Intrusion Detection System (IDS) include the following;

Statistical anomaly-based detection.Stateful protocol analysis detection.Signature-based detection.

What is a signature-based detection system?

A signature-based detection system can be defined as a type of detection and protection system which is designed and developed to detect a malicious attack such as a worm, virus, trojan, malware etc., by checking and matching them with a repository of specific signatures, patterns or fingerprints.

Read more on signature-based detection here: https://brainly.com/question/7615966

#SPJ1

part of file explorer that is used to access devices, drives, and folders on your computer. (1 point) location this pc status

Answers

A part of file explorer that is used to access devices, drives, and folders on your computer is: This PC.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and it processes these data into an output (information), which can be used to perform a specific task through the use of the following computer parts:

KeyboardNetworkMonitor screenMouseHard-disk drive

In the Windows operating system, "This PC" is a part of file explorer that is designed and developed to enable end users access devices, drives, and folders on their computer.

Read more on computer here: https://brainly.com/question/24540334

#SPJ1

If a change is made to the active
cell, what type of cell will also
change?
Precedents
Dependents

Answers

Answer:

precedents

Explanation:

suppose you found that your model is suffering from high variance. which algorithm do you think could handle this situation and why?

Answers

Handling High Variance

For handling issues of high variance, we should use the bagging algorithm.
The bagging algorithm would split data into sub-groups with a replicated sampling of random data.
Once the algorithm splits the data, we use random data to create rules using a particular training algorithm.
After that, we use polling for combining the predictions of the model.

Answer this and I’ll do your work for a week

Answers

Answer:

Explanation:meeeeeeeeeeeeeeeeee

Answer: ok

Explanation:

Easy

_____materials from a source text without properly citing the source is an example of plagiarism.(drivers ed)
A)Reviewing
B)Considering
C)Paraphrasing
DReading

Answers

Answer:

C

Explanation:

Paraphrasing materials from a source text without properly citing the source is an example of plagiarism. (drivers ED)

The correct answer is C)Paraphrasing

Which of the following are considered software piracy? Check all of the boxes that apply.
A.burning a music CD to give your friend from a band you both like
B.using works from Creative Commons
C.copying a program to give to someone else to use
D.burning a copy of a DVD to sell

Answers

Copying a program to give to someone else to use will be considered as a  software piracy.

What is Software piracy?Software piracy refers to copying, selling or distributing a software that is legally protected. According to the options given, the action that would not reduce software piracy is making it easy to copy the software as it will facilitate the job for people to get illegal copies of it.

The other options would help reduce software piracy because reducing the cost of software would make it more accessible to people with low income, offering downloads of software would get people to use the official version instead of an illegal copy and using some Commons licensing would allow people to use and share the software for free.

So, Option C is the correct answer.

Learn more about software piracy,

https://brainly.com/question/20828627

#SPJ1

Answer

the answer is in the screenshot below

Explanation:

Hello guys where's bios chip in this motherboard ​

Answers

Answer:

Black Chip Near the Ram slot.

government systems typically lack resources and it expertise and operate on outdated hardware and software. this makes them particularly vulnerable to ransomware attacks.

Answers

Government systems typically lack resources and IT expertise and operate on outdated hardware and software. This makes them particularly vulnerable to ransomware attacks: True.

What is an information system?

An information system (IS) can be defined as a collection of computer systems and Human Resources (HR) that is used by a business organization or manager to obtain, store, compute, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products from one location to another.

The components of an information system (IS).

In Computer technology, there are different components of an information system (IS) and these include the following:

SoftwareDataProceduresHardware

Generally speaking, operating on outdated hardware and software and lack of resources and IT expertise would make an information system (IS) to be potentially vulnerable to ransomware attacks.

Read more on information system here: brainly.com/question/24944623

#SPJ1

Complete Question:

Government systems typically lack resources and IT expertise and operate on outdated hardware and software. This makes them particularly vulnerable to ransomware attacks. True or False?

The central point of Christian belief is that God, the Father, entered into human history as the
Son, Jesus of Nazareth, and arose as the Holy Spirit.​

Answers

Answer:

The central point of Christian belief is that God, the Father, entered into human history as the Son, Jesus of Nazareth, and arose as the Holy Spirit. Christian Philosophy God is the Creator of the universe.

Explanation:

the < > selector with code { font-weight: bold; } will cause all heading 1 text to be displayed with the bold font-weight attribute.

Answers

h1{ font-weight: bold; } will cause all heading 1 text to be displayed with the bold font-weight attribute.

If you're looking to add a little bit of style to your website, the h1{ font-weight: bold; } CSS property is a great way to do it. This property will cause all heading 1 text to be displayed with the bold font-weight attribute, making it stand out from the rest of your content.

This is a great way to add a bit of visual interest to your site and make it more eye-catching for visitors. Plus, it's a simple CSS property to use, so it's easy to add to your site's stylesheet. So if you're looking for a way to add some pizzazz to your site, h1{ font-weight: bold; } is a great option!

Learn more on heading here:

https://brainly.com/question/15858153

#SPJ4

a fileless malicious software can replicate between processes in memory on a local host or over network shares. what other behaviors and techniques would classify malware as fileless rather than a normal virus? (select all that apply.) a.

Answers

Uses lightweight shellcode and Uses low observable characteristic attacks is a Technique that will classify malware as file less rather than a regular virus.

As a computer user, you will usually find several problems related to your computer. One example is using an administrator account to download and install software applications. After the user runs the .exe extension installer file, the user often experiences crashes, slow computer performance, and strange services that run when turning on the computer, this is because the user downloads a Trojan horse malware.

To learn more about Malicious Software please go to link https://brainly.com/question/14309905

#SPJ1

which command displays the encapsulation type, the voice vlan id, and the access mode vlan for the fa0/1 interface?

Answers

A command which displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface is: B. show interfaces Fa0/1 switchport.

What is a command?

A command can be defined as the set of instructions that is used to configure a network device such as a router, so as to make it active on a computer network and enable it perform certain tasks automatically during network communication.

In Computer networking, "show interfaces Fa0/1 switchport" is the command (syntax) that is designed and developed to avail an end user the opportunity to displays the following information for the Fa0/1 interface:

Operational Trunking EncapsulationAdministrative ModeOperational ModeSwitchportAdministrative Trunking EncapsulationTrunking Native Mode VLANAdministrative Native VLAN taggingVoice VLANNegotiation of TrunkingAccess Mode VLAN

Read more on switchport here: https://brainly.com/question/27874920

#SPJ1

Complete Question:

Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

show vlan brief

show interfaces Fa0/1 switchport

show mac address-table interface Fa0/1

show interfaces trunk

Discussion Topic

Discuss how the color scheme of a web page can relate to its content. Suggest
ways in which web designers can use color to make a statement about the
subject of a web page, a brand, or the website itself.

Answers

Answer:

Colors represent different meanings to us, not only artistically but also in how we feel. Colors like red and pink for example could be used on a dating site since those colors typically adhere to those characteristics in our modern society. Thus, choose the colors that fit the theme and the goal of the page.

write a statement that assigns finalresult with the sum of num1 and num2, divided by 3. ex: if num1 is 4 and num2 is 5, finalresult is 3. java

Answers

The question states that we have to write a code in java, that adds two numbers num1 and num2 and then divide the sum by 3. Store the result of the calculation in the variable named finalresult.

This program can be coded in any programming languages such as C, C++, C#, and Java. But as given in the question, it is required to write it in Java programming language. Java is a high level programming language that is used to develop applications and programs.

The code is given below what is required in the question.

public class MyClass {

   public static void main(String args[]) {

  int num1;// declared variable num1

  int num2;//declared variable num2

     float finalresult;//declared variable finalresult which store the result

 

    num1 = 4;//assigned value to num1

     num2 = 5;//assigned value to num2

 

     finalresult = (num1 + num2)/3;/* calculation performed and result stored in variable finalresult*/

     System.out.println("Sum of " +num1+" and " + num2+ " is  " + finalresult);//output display

}

}

You can learn more about how to sum numbers in java at

https://brainly.com/question/24412452

#SPJ4

Select the correct answer.
Which option should you select to accept a tracked change?
O A.
Accept
Reject
O C. Review
OB.
O D. Delete

Answers

Answer:

Explanation:

Which option should you select to accept a tracked change?

A.  Accept

Under the Home tab, controls for aligning text and objects can be found in the
Clipboard group.
Font group
Paragraph group.
Editing group.

Answers

i believe the answer is editing group

Answer:

Paragraph Group

Explanation:

Which two wildcard characters are supported by the find and replace dialog box in an excel worksheet?.

Answers

The find and replace dialog box in an Excel worksheet supports the wildcard characters ? and *. Microsoft developed Microsoft Excel, a spreadsheet, for Windows, macOS, Android, and iOS.

It has calculation or computation capabilities, graphing tools, pivot tables, and the Visual Basic for Applications macro programming language (VBA). The Microsoft Office program suite includes Excel.

Excel is most frequently utilized in professional settings. It is utilized, for instance, in operations management, performance reporting, human resource management, and business analysis. Excel uses a sizable group of formatted cells to arrange and manipulate data as well as perform mathematical operations.

Learn more about excel https://brainly.com/question/23567635

#SPJ4

What is machine? Any three example of cpu ? show principle of computer.​

Answers

Answer:

Single Core

Dual Core

Quad Core

Explanation:

if you are using an administrator account during a software installation and you get prompted by the uac, you should

Answers

All you have to do if you are using an administrator account during a software installation and you get prompted by the UAC is click continue and finish the installation.This is because processes that require an administrator access token cannot be silently installed when UAC is enabled, the user must explicitly give consent by clicking yes or by providing administrator credentials.

Windows Security can be defined as a built-in application available in Windows 10 that provides a user-friendly interface and tools to manage common security features. An example is Microsoft Defender Antivirus, which offers real-time protection for your computer and data against viruses and many other types of malware. With Windows Security, our computers become more secure and the files on the computer.

Learn more about Windows Security here https://brainly.com/question/14262072

#SPJ4

eliminating drafts in the birth room and in the nursery will help to prevent heat loss in a newborn through which mechanism?

Answers

The act of eliminating drafts in the birth room and in the nursery will help to prevent heat loss in a newborn through option b. conduction  mechanism.

What is convection in a newborn?

The term Convection as it connote in the birth room is known to be the loss of heat from the newborn's skin to that of their  surrounding air.

Note that Newborns tends to lose a lot of heat by convection and this can be handled by the use of conduction  

Therefore, The act of eliminating drafts in the birth room and in the nursery will help to prevent heat loss in a newborn through option b. conduction  mechanism.

Learn more about Convection  from

https://brainly.com/question/9382711
#SPJ1

a. evaporation

b. conduction

c. convection

d. radiation

Marisa stood in front of her colleagues and delivered a presentation about how to use their company’s new email program. At the end of the presentation, Marisa felt like she did a great job. However, most of the workers had no idea what Marisa was talking about. They were clueless about how to use the new program. How did this happen? Describe how the communication process works so that messages are exchanged and understood, and why Marisa’s colleagues may not have understood the new email program after her presentation.

Sergio has been assigned to write all of his company’s social media posts. His supervisor tells him to beware of what he posts because sometimes these messages are misinterpreted by the public. What are three barriers of communication that might occur when people are interpreting social media posts? What steps can Sergio take to try to avoid a misstep with one of these barriers?

When Lavonda is conducting online research for her upcoming presentation on Internet etiquette in the workplace, she comes across an amazing presentation someone in Australia created that is exactly what she was planning to create. It would save her a lot of time if she could just change the name of the presenter to her own name and present that exact material as it is written. However, she isn’t sure if this is the right thing to do. What is the MOST ethical course of action Lavonda should choose in this scenario? How can she be sure that her choice complies with all applicable rules, laws, and regulations?

Stephen is extremely frustrated after a long day at work. He wants to vent on his favorite social media platform. He types, “I already have WAY too much to do at work and THEN my colleague tells me she’s pregnant and gets to take six weeks off to have a baby! Guess I’ll be doing all of her work too. UGH!” Before he clicks to post this message, what are four questions Stephen should ask himself to help him assess the ethical and legal implications of his message? If Stephen chose to post this message, how would this message MOST likely be interpreted by someone from his HR department?

Veronica is traveling for work. She will be talking to business partners in New York, Paris, South Africa, Saudi Arabia, and Japan. She will be proposing a new product line to a group of executives in each location. How might cultural differences make each of these meetings slightly different from one another? What are some potential communication problems Veronica might face during this multicultural, international business trip?

Answers

Marisa’s colleagues may not have understood the new email program after her presentation as the communication was ineffective.

The three barriers of communication that might occur when people are interpreting social media posts include ethnic, gender, and cultural identities.

The ethical course of action that Lavonda should choose in this scenario is to contact the owner of the book.

If Stephen chose to post this message, it'll be interpreted by someone from his HR department that headed up with his work.

The potential communication problem that Veronica might face during this multicultural, international business trip is language barrier

How to explain the information?.

It should be noted that communication simply means the exchange of information between different parties.

In this case, Marisa’s colleagues may not have understood the new email program after her presentation as the communication was ineffective. This led to the colleagues not getting the message.

Learn more about communication on:

brainly.com/question/26152499

#SPJ1

declaring a member as in the base class provides access to that member in the derived classes but not to anyone else.

Answers

Declaring a member as protected in the base class provides access to that member in the derived classes but not to anyone else.

Base class and derived classes are concepts of inheritance in the paradigm of Object Oriented Programming. Inheritance is the process in which a new class (called derived class) is created from an existing class (called base class).

When a drive class is created from the base class, it has access to some members of the base class. There are three types of access specifiers to declare members in the base class in order to provide their access in the derived classes.

The first is declaring a member as private. Private members of the base class cannot be accessed by anyone, even not by the derived classes. The second is declaring the base class members as public. Public members can be accessed by anybody including derived classes. The third type is declaring members as protected. Protected members of the base class have accessibility only in derived classes.

Thus, when a member is declared as protected in the base class, it gives access to that member in the derived classes but not to anyone else.

You can learn more about access specifier at

https://brainly.com/question/28289695

#SPJ4

Other Questions
What group ended the Umayyad Empire 7. If a person wanted to become a physicist, besides physics what other courses of study would be essential areas of study? O medicine, biotechnology, genetics, and pharmacology O mathematics, statistics, logic, and computer science O chemistry, physics, astronomy, and earth science biology, paleontology, biochemistry, and zoology HELP PLEASE EMERGENCY URGENT!!!!! What is the central idea of "To Build a Fire"?A-People choose their own destinies.B-Nature is more powerful than humans.C-In nature, humans live by instinct.D-Heed the advice of the experienced. list down four ways to start word 2010 (01.02 lc) the idea that states could cancel any federal legislation they deem unconstitutional is known as Which feature on its head has a structure that enables the animal to eat itsfood? Sea lionA. EyesB. NoseC. MouthD.whiskers Determine the intercepts of the line.y = -32 + 12y-intercept:x-intercept: DO I believe that international cooperation can prevent conflicts and wars?why? Hello!!!Paragraph 2 refers to the process taken by states as they "voted for ratification." In the excerptbelow, select the phrase that helps explain the meaning of ratification.As has been pointed out by the chairman, a 7-year time limit was placed on it. In1978, the proposed amendment had been approved by 35 States. Unfortunately, noadditional States had voted for ratification before the new deadline and the proposedamendment died on June 30, 1982 Easy please answer will give brainlist. The airfare from peshawar to karachi of an airline is rupees 5700 .what will be the selling price of this ticket if rupees 1500 airport tax and gst at the rate of 16.5% are included. Which city lies south of 30N latitude? Thebes Jericho Ur Smyrna According to Periodic Law, elements arranged in order of increasing atomic number are placed together in groups having The cube of the product of 8 and a number. What was one way that the United States implemented enlightenment ideas into their new government Describe an example of fermentation that occurs in beneficial bacterial cells within animals and explain why it is important. A distribution between 2 sets of genes is called what? What do the results tell us about the experiment? The bacteria from all 3 farms were almost 100% alive in the control samples, meaning that the experiment did not work. None of the bacteria from the 3 farms survived in the control samples. Because the bacteria in the control were almost 100% alive, we know that any deaths of bacteria in the other samples was because of the antibiotics. which statements about subjective ideas are true Which is better a streamer or content creator cause if so I will be doing that job (: