Using the Internet, search and discuss why naming conventions are important and why programmers should consistently follow them. What problems can arise in naming variables if one convention is not followed.

Answers

Answer 1

Answer:

Answered below

Explanation:

Some variable naming conventions include;

1) Variable should begin with either a letter or an underscore.

2) Variables having multiple words should have the first letter of every word after the first word, capitalized. This is the camelCase style.

3) variables should not be named after any of the inbuilt keywords except on special operations to override the original function of such keyword.

4) variable names are case-sensitive.

The importance of following these conventions is to maintain readability and consistency of code. Failure to follow these conventions may lead to chaotic codes, bugs and inefficient performance.


Related Questions

Good people can y'all help me do this activity

For Part 1 of the activity: 1. Look around you. Talk to your friends and family. Talk to other people in your network. Keep an eye on the local news. Search on the internet. Do you observe any common problem that many of these people are facing? That just can be your business opportunity! 2. But before you jump ahead and start looking at this problem as your business opportunity, you need to first think whether you have any idea on how to solve the particular problem. You also need to find out whether the people facing this problem are even keen on a solution they have to pay for. 3. As a tip, remember that your potential customers should feel that the problem that they are facing is an acute one and their life is affected because of it......

Answers

Answer: I don't think anyone can help with that

Explanation:

Also i don't think this is coding related-

Which kind of devices uses radio waves to transport data? devices use radio waves to transport data.

Answers

Answer:

In computer networking, RF is used to describe network devices (hubs, bridges, etc.) that transmit data signals using radio waves instead of data cables or telephone lines.

Explanation:

Answer:

In computer networking, RF is used to describe network devices (hubs, bridges, etc.) that transmit data signals using radio waves instead of data cables or telephone lines.

Explanation:

With software prefetching, it is important to be careful to have the prefetches occur in time for use but also to minimize the number of outstanding prefetches to live within the capabilities of the microarchitecture and minimize cache pollution. This is complicated by the fact that different processors have different capabilities and limitations. a. [15] <2.3> Create a blocked version of the matrix transpose with software prefetching. b. [20] <2.3> Estimate and compare the performance of the blocked and unblocked transpose codes both with and without software prefetch

Answers

The answer is no pls


Jim wants to enlarge a black-and-white photograph with a warm-black tone. What type of black-and-white paper emulsion should Jim use for this
process?
A chlorobromide
B. bromide
C. chloride
D platinum

Answers

Answer:

A. Chlorobromide

Explanation:

I took the test and got it right. (Plato)

The type of black-and-white paper emulsion should be used by Jim is chlorobromide. Thus, option (A) is correct.

What is emulsion?

A sort of colloid called an emulsion is created by mixing two liquids that wouldn't typically mix. A dispersion of the other liquid is present in one liquid in an emulsion.

Emulsions frequently occur in foods like egg yolk, butter, and mayonnaise. Emulsification is the process of combining liquids to create an emulsion.

According to the above scenario, Jim wishes to expand a warm-toned black-and-white photograph. For this purpose, he should use chlorobromide for black-and-white paper emulsion.

Paper covered with a chemical compound that is light-sensitive, which is inferred as photographic paper. When exposed to light, it captures the latent image.

Therefore, it can be concluded that option (A) is correct.

Learn more about emulsion here:

https://brainly.com/question/6677364

#SPJ2

Mobile cameras are now of a higher quality than when they first arrived on the market. Describe the difference in
resolution that has come about and how that has led to higher photo quality.

Answers

Answer:

When mobile cameras first arrived on the market, they did not have a high-quality resolution. But after the years, mobile cameras are able to record a significant amount of digital information.

At which stage should Joan discuss the look and feel of her website with her website designer?
At the
stage, Joan should discuss the look and feel of her website with her website designer.

At which stage should Joan discuss the look and feel of her website with her website designer?At thestage,

Answers

Answer:

Development stage: It is great to talk with the website designer during the development stages to understand the goals

Answer:

At the planning stage maybe?

Explanation:

I'm not positive but in plato it discusses this in the Website Development Proccess lesson.

Which of the following is the MOST important reason for creating separate users / identities in a cloud environment?​

Answers

Answer:

Because you can associate with other

Answer:

Explanation:

To avoid cyberbully

2. What are some worst practices in email composition?

Answers

Answer:

1. Pointless email subject

2. Junk and broken links

3. Spelling and grammatical error

4. Spamming the same emails

5. Poor content

Explanation:

1. A pointless or misleading email subject. Nobody knows what your email is about, your best bet is to construct a subject that appeals to your targeted audience & increases the chance of the email being opened.

2. Unnecessarily lengthy email filled with broken links. Getting error messages or invalid landing pages is so so uncool (for the sender of the email). Recipients might just blacklist the sender subsequently.

3. Presence of spelling and grammatical mistakes in your emails. Poor spelling & grammatical construct is a turnoff for many a people. Once they spot it, that's a big NO NO!

4. Flooding people with the same email again and again. That's a quick way to get on the nerves of many folks. Nothing hurts more than having a human-sized pest disturbing you inbox.

5. Poor content quality. You got the recipient to open the email and you dish out something useless. Your were better not sending the emails at all.

The list goes on and on but is not restricted to the aforementioned

Which definition of levels of is correct?
O A. voltage at which an audio device receives sound
B.
volume at which someone plays audio on a device
OC. voltage at which a device plays audio
OD. frequency of sound waves alternating on a device

Answers

Answer:

D. frequency of sound waves alternating on a device

Explanation:

Answer:

frequency of sound waves alternating on a device

Explanation:

A brand of shame .. from infancy " is a brand on Jocasta​

Answers

Answer: DIDN'T UNDERSTAND

Why might a programmer use a "linked list" instead of an "array" to store data in a computer program?

Answers

The programmer uses a “linked list” instead of an “array” to store data due to its dynamic nature and quicker insertion/deletion time complexity, linked lists.

What is a linked list?

A linked list is a linear line or collection of data whose data is not organized in a way in a physical memory. A data structure consists of collecting nodes.

The array is also a collection of data of elements. They are identified by an array index and array key.

Thus, the programmer used a “linked list” instead of an “array” because It is the quick and easy way.

To learn more about the linked list, refer to the link:

https://brainly.com/question/13144722

#SPJ1

How many NOTS points are added to your record for not completely stopping at a stop sign?

Answers

The number of NOTS points added to your record for not completely stopping at a stop sign can vary depending on the location and laws of the jurisdiction where the traffic violation occurred. It is important to note that not stopping fully at a stop sign is a serious safety violation, and it can result in a traffic ticket, fines, and possible points on your driver's license record.

In some jurisdictions, failing to stop at a stop sign can result in a citation for running a stop sign or a similar violation. In other jurisdictions, it may be categorized as a failure to obey traffic signals or a similar violation. The number of NOTS points added to your record, if any, will depend on the specific violation charged and the point system used by the jurisdiction in question.

It's important to note that NOTS points are used to track and measure the driving record of a driver, and they may impact insurance rates and license status. It's always a good idea to familiarize yourself with the laws and regulations in your area and drive safely to reduce the risk of violations and penalties.

What are the differences between barcode reader and biometric input device

Answers

Answer:

A barcode reader scans a barcode that is comm0only found on an item that you would buy from the store, for inventory purposes. A biometric device is something that requires something from the human for a form of identification. Like a fingerprint scanner that can be found on a cash register for employees or face id found on a smartphone.

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

Answers

In credentialed scanning, policy compliance plugins give you an advantage  known as option C: Customized auditing.

What does auditing serve to accomplish?

The goal of an audit is to determine if the financial report's information, taken as a whole, accurately depicts the organization's financial situation as of a particular date. For instance, is the balance sheet accurately recording the organization's assets and liabilities?

Therefore since the goal of such a tailored audit, aside from cost and time savings, so, it is to present an objective overall picture of your supplier's organization in all pertinent disciplines, allowing you to better target risk areas and allocate control resources where they are most needed.

Learn more about Customized auditing from

https://brainly.com/question/7890421
#SPJ1

See full question below

The security administrator for Corp.com. You are explaining to your CIO the value of credentialed scanning over non-credentialed scanning. In credentialed scanning, policy compliance plugins give you which advantage?

More accurate results

Safer scanning

Customized auditing

Active scanning

Write a python code that prompts the user for the value of n and prints the sum of the series 1+ 1/2+ 1/3 +…..+ 1/n

Answers

The  Python code snippet that brings the user for the value of n and calculates the sum of the series 1 + 1/2 + 1/3 + ... + 1/n is given below

What is the python code?

Python is a programming language that is versatile and has a high level of abstraction suitable for a variety of purposes. The emphasis of the design philosophy is on enhancing code readability through the utilization of significant indentation, which is implemented via the off-side rule.

One can use a for loop in this code to traverse from 1 up to n. In each round, the sum_series variable is incremented by the inverse of the present value of 'i'. the output of the value of sum_series, denoting the summation of the sequence comprising 1 + 1/2 + 1/3 + ... This could be expressed as the reciprocal of n, or one divided by n.

Learn more about  python code from

https://brainly.com/question/26497128

#SPJ1

Write a python code that prompts the user for the value of n and prints the sum of the series 1+ 1/2+

The printer that sprays ink onto the paper
A . Laser printer
B . Impact printer C . Inkjet printer
D . Thermal printer

Answers

Answer:

C

Explanation:

An Inkjet printer is a computer peripheral that sprays liquid ink onto paper in tiny sizes.

For questions 5-8, consider the following code:



def mystery(a = 2, b = 1, c = 3):

return 2 * a + b + 3 * c

What is the output for mystery(4, 3, 7)?

What is the output for mystery(5, 8)?

What is the output for mystery(1)?

What is the output for mystery()?

Answers

Answer:

les go, it has optional parameters so...

Explanation:

output of 1 is 32

second 27

third 12

fourth 14

PLEASE HELP WILL GIVE BRAINLIEST!!!’

What is a Path, and how do you know that it is filled and selected?
A Path is a series of (blank)
that you can join together. As you click a point in a curve, it changes color and becomes (blank).

Answers

Answer: What is a Path, and how do you know that it is filled and selected?

A Path is a series of curves that you can join together. As you click a point in a curve, it changes color and becomes black.

__________ often causes overactive eye movement.

A. Alcohol

B. Nicotine

C. Morphine

D. Xanax

Answers

the answer is ; D , xanax
the answer is d :)..

John typed 350 word in 25 minute. What is his typing speed.

Answers

Answer:

14 works per min

Explanation:

350 divided by 25 equals 14

a stop watch is used when an athlete runs why

Answers

Explanation:

A stopwatch is used when an athlete runs to measure the time it takes for them to complete a race or a specific distance. It allows for accurate timing and provides information on the athlete's performance. The stopwatch helps in evaluating the athlete's speed, progress, and overall improvement. It is a crucial tool for coaches, trainers, and athletes themselves to track their timing, set goals, and analyze their performance. Additionally, the recorded times can be compared to previous records or used for competitive purposes,such as determining winners in races or setting new records.

you can support by rating brainly it's very much appreciated ✅

Which of the following need to be taken into consideration during the system security planning process?
A. how users are authenticated
B. the categories of users of the system
C. what access the system has to information stored on other hosts
D. all of the above

Answers

During the system security planning process, it is important to evaluate how the following users are authenticated.

What is planning process?

The sorts of users on the system, their rights, the kinds of information they can access, and how and where they are defined and validated should all be taken into account during the system planning process. Planning for system security aims to better secure information system resources. All federal systems are sensitive to some extent, and as part of sound management practise, they must be protected. A system security plan must include a description of how a system will be protected. No matter the objectives of a security policy.

It is impossible to ignore any of the three key requirements of confidentiality, integrity, and availability because they all support one another.

To learn more about resources from given link

brainly.com/question/28605667

#SPJ4

It's crucial to consider how the following users are authenticated while considering the security of the system.

The planning process is what.

During the system design process, it is important to consider the different types of system users, their rights, the types of information they may access, and how and where they are defined and validated. The goal of system security planning is to increase the security of information system resources. All federal systems are somewhat delicate, and they must be safeguarded as part of good management practices. A description of a system's defenses must be included in a system security strategy. Regardless of a security policy's goals.

The three fundamental needs of secrecy, integrity, and availability cannot be disregarded.

To learn more about resources from given link

brainly.com/question/28605667

#SPJ4

What is programming blocks?

Answers

Answer:

In computer programming, a block or code block is a lexical structure of source code which is grouped togethe

Explanation:

an opening inside the system unit in which you can install additional equipment can be known as

Answers

Answer:

A bay is an open area inside the system unit in which you can install additional equipment.

A ______ can hold a sequence of characters such as a name.

Answers

A string can hold a sequence of characters, such as a name.

What is a string?

A string is frequently implemented as an array data structure of bytes (or words) that records a sequence of elements, typically characters, using some character encoding. A string is typically thought of as a data type. Data types that are character strings are the most popular.

Any string of letters, numerals, punctuation, and other recognized characters can be stored in them. Mailing addresses, names, and descriptions are examples of common character strings.

Therefore, a string is capable of storing a group of characters, such as a name.

To learn more about string, refer to the link:

https://brainly.com/question/17091706

#SPJ9

Create a python program that asks the user to input the subject and mark a student received in 5 subjects. Output the word “Fail” or “Pass” if the mark entered is below the pass mark. The program should also print out how much more is required for the student to have reached the pass mark.

Pass mark = 70%



The output should look like:

Chemistry: 80 : Pass: 0% more required to pass

English: 65 : Fail: 5% more required to pass

Biology: 90 : Pass: 0% more required to pass

Math: 70 : Pass: 0% more required to pass

IT: 60 : Fail: 10% more required to pass

Answers

HERE IS THE CODE

pass_mark = 70# Input marks for each subjectchemistry_mark = int(input("Chemistry: "))english_mark = int(input("English: "))biology_mark = int(input("Biology: "))math_mark = int(input("Math: "))it_mark = int(input("IT: "))# Calculate pass or fail status and percentage required to passchemistry_status = "Pass" if chemistry_mark >= pass_mark else "Fail"chemistry_percent = max(0, pass_mark - chemistry_mark)english_status = "Pass" if english_mark >= pass_mark else "Fail"english_percent = max(0, pass_mark - english_mark)biology_status = "Pass" if biology_mark >= pass_mark else "Fail"biology_percent = max(0, pass_mark - biology_mark)math_status = "Pass" if math_mark >= pass_mark else "Fail"math_percent = max(0, pass_mark - math_mark)it_status = "Pass" if it_mark >= pass_mark else "Fail"it_percent = max(0, pass_mark - it_mark)# Output resultsprint(f"Chemistry: {chemistry_mark} : {chemistry_status}: {chemistry_percent}% more required to pass")print(f"English: {english_mark} : {english_status}: {english_percent}% more required to pass")print(f"Biology: {biology_mark} : {biology_status}: {biology_percent}% more required to pass")print(f"Math: {math_mark} : {math_status}: {math_percent}% more required to pass")print(f"IT: {it_mark} : {it_status}: {it_percent}% more required to pass")

The program asks the user to enter their scores for each subject, determines if they passed or failed, and calculates how much more they need to score in order to pass. The percentage needed to pass is never negative thanks to the use of the max() method. The desired format for the results is printed using the f-string format.

whats the best practices for a cyber security agent ??

Answers

Some of the key best practices for a cyber security agent include:

Stay updatedImplement strong security measuresPractice secure coding and development

What should cyber security agents watch out for ?

Sustained awareness of the ever-evolving cybersecurity landscape is imperative. Agents must actively pursue knowledge through training, certifications, and participation in industry events to stay abreast of the latest threats, trends, and technologies.

Implementing formidable security measures is paramount. This encompasses deploying firewalls, intrusion detection systems, encryption protocols, and fortified authentication mechanisms.  Emphasize secure coding practices during the development lifecycle.

Find out more on cyber security at https://brainly.com/question/31026602

#SPJ1

identify another natural cyclic event, other than phases and eclipses, that is caused by the moon's gravitational pull on earth

Answers

Answer:

TEKS Navigation

Earth Rotation.

Moon Phases.

Tides.

Cyclical events happen in a particular order, one following the other, and are often repeated: Changes in the economy have followed a cyclical pattern. an example would be pamdemic and vircus it is belived that a new pamdemic starts every 100 years.

Explanation:

The rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth

The gravitational pull of the moon's causes the two bulges of water on the Earth's oceans:

where ocean waters face the moon and the pull is strongestwhere ocean waters face away from the moon and the pull is weakest

In conclusion, the rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth

Read more about gravitational pull

brainly.com/question/856541

problem description IT​

Answers

In IT, a problem description refers to a clear and concise explanation of an issue or challenge that needs to be resolved within a technology system or application.

How is this so?

It involves providing relevant details about the symptoms, impact, and context of the problem.

A well-written problem description outlines the specific errors, failures, or undesired behavior observed and provides enough information for IT professionals to analyze and identify potential solutions.

A comprehensive problem description is crucial for effective troubleshooting and problem-solving in the IT field.

Learn more about Problem Description at:

https://brainly.com/question/25923602

#SPJ1

Determine all cache accesses and the state of the data cache at any given time. From this you can determine any additional cycles from data cache misses. You must calculate the number of bits for the offset, index, and tag, determine the number of hits and misses, show the contents of the cache, and use the number of misses to determine any additional clock cycles required. The total clock cycles would be the total cycles for all iterations from Part 2 plus any additional memory access cycles from cache misses from Part 3.

Answers

The smallest and fastest part of a computer system's memory is the cache. The registers, which make up a very minor portion of the computer CPU, are quick storage components.

Why does the cache memory access time take less time than the main memory access time?

Cache memory must be substantially smaller than main memory in order to be situated near to the CPU. As a result, it has less room for storage. Due to the increased performance of the more complicated chip, it is also more expensive than main memory.

What distinguishes Level 1 from Level 2 and Level 3 cache benefits?

Since it is the smallest and nearest to the CPU, Level 1 (L1) cache memory is the quickest type. On the processor chip, Level 2 (L2) has a larger capacity but a slower speed. The computer that uses the L2 cache has the biggest capacity Level 3 (L3) cache memory.

To know more about Cache memory visit:-

https://brainly.com/question/16091648

#SPJ4

Other Questions
Ms. Womack has a piecepiece ofribbon that is 3 yards long.If she cuts it into 5 piecesof equal length, how longwill each piece be (whatfraction of a yard?) to greaDraw it !!! regarding using humor in a presentation, which of the following statements in false? group of answer choices beware of using humor that is off-the-wall or inappropriate humor. make sure your punch line is clear. humor should be used sparingly and focus only on your own life. humor is a great way to keep a buyer's attention and build rapport. PLEASE be quick I have 1 min!!!!!! PLSSS Suppose a paper describes a study that investigated the usefulness of using MRI (magnetic resonance imaging) to diagnose breast cancer. MRI exams from 650 women were reviewed. Of the 650 women, 19 had breast cancer, and the MRI exam detected breast cancer in 18 of these women. Of the 631 women who did not have breast cancer, the MRI correctly identified that no cancer was present for 541 of them. The accompanying table summarizes this information.Suppose that an MRI exam is used to decide between the two hypotheses.--> H0: A woman does not have breast cancer.--> Ha: A woman has breast cancer.(Although these are not hypotheses about a population characteristic, this exercise illustrates the definitions of Type I and Type II errors.)(a) One possible error would be deciding that a woman who has breast cancer is cancer-free. Is this a Type I error or a Type II error? a. Type I b. Type II Use the information in the table to approximate the probability of this type of error. (Hint: See Example 10.8. Enter your probability as a fraction.) ____?_____(b) There is a second type of error that is possible in this context. Describe this error. a. In this scenario, a Type I error is concluding that a woman has cancer when she really does not have cancer. b. In this scenario, a Type II error is concluding that a woman has cancer when she really does not have cancer. Use the information in the table to approximate the probability of this type of error. (Enter your probability as a fraction.) _____?______ The information you share, the type of language used and the depth of topic are all things you need to consider: Two consecutive numbers exist such that the sum of three times the first number and two less than the second number is equal to 144. What are third numbers Why should you avoid sharing eating utensils?A. You could get HIV.B. You could be infected with an STD.C. You could get an infectious disease.D. None of the above a client, prescribed dextroamphetamine for attention deficit hyperactivity disorder (adhd) has developed a common adverse effect of the medication since beginning therapy. which initial intervention should the client be encouraged to implement? The product of 7 and a number is greater than 42. If the number is a whole number less than 10 , what could the number be? what next step should you take to determine the competitiveness of your compensation program A 1.8 kg book has been dropped from the top of the football stadium. Its speed is 4.8 m/s when it is 2.9 meters above the ground. A). What is its total mechanical energy? (mechanical energy includes kinetic and gravitational potential)B). What was the total mechanical energy of the book at the instant it was released? C). How high is the stadium? a series circuit has two resistors with values r1 = 7.0 and r2 = 2.0 . if the potential of the circuit is 10.0 v, what is the current through r2? the output of cellular respiration are Do you think it is fair for dealers to charge you more for a car they pay the manufacturer Express 35 as a fraction of 95. . A 750 kg car is sitting at the top of Columbia hill (27.5 degree) and accelerates from rest to the school the engine applies a force 1100 N while the coefficient of friction is 0.44. The French and the British A) tried unsuccessfully to work together in the fur trade B) were both uninterested in expanding their empires C) allied themselves with different Indian tribes Here are the score that Jenna has received on her seven quizzes 16 11 20 16 12 17 18 what is the lower quadrille A = (1, 3, 5, 7, 9)B = {2, 4, 6, 8, 10)C = (1, 5, 6, 7, 9)A U (B n C) ={1,5,7,9)(1, 3, 5, 6, 7, 9)(1,5, 6, 7, 9)set theory If there is 1/4 ounces of yeast in every 2 and 1/4 teaspoons and you need 2 teaspoons how many ounces of yeast is needed