If a program contains an error that divides a number by zero at the execution time. this error is a:_________

Answers

Answer 1

If a program contains an error that divides a number by zero at the execution time. this error is a Semantic error.

Text that is grammatically correct but makes no sense is a semantic mistake. In the case of the C# programming language, an illustration would be "int x = 12.3;" - This sentence is illogical since 12.3 is not an integer literal and there is no implicit conversion from 12.3 to int. However, it is grammatically sound.

The disruption of access to semantics or lexical representations leads to semantic mistakes. Examining the understanding of words that cause name semantic problems is one technique to identify their causes.

A semantic error is flawed logic that results in the incorrect behaviour when applied, as opposed to a syntax error, which is an incorrect construction of the source code.

Learn more about error:

https://brainly.com/question/25671653

#SPJ4


Related Questions

Since the ntfs file system enjoys more widespread compatibility with other operating systems, it is often used on removable devices such sd cards and usb flash drives.
a. true
b. false

Answers

Answer: false

Explanation:

Size vs capacity the netvidsdatabase class had two methods called size and capacity. what is the difference between size and capacity?

Answers

The NetvidsDatabase class is a data structure that stores information about movies. The size of the NetvidsDatabase represents how many movies are currently in the database, while the capacity represents how many movies can be stored in the database before the underlying array needs to be expanded.

When the NetvidsDatabase is first created, its size and capacity are both set to 0. As movies are added to the database, the size is incremented. If the size reaches the capacity, then the capacity is doubled and the underlying array is expanded to accommodate the new movies.

The NetvidsDatabase class is an efficient way to store and manage information about movies. The size and capacity parameters help to ensure that the underlying array does not need to be frequently expanded, which can save time and resources.

Learn more here:

https://brainly.com/question/28347588

#SPJ4

What controls the interactions between hardware and user applications?(1 point) domains domains programming languages programming languages system software system software hardware layers

Answers

The system software controls the interactions between hardware and user applications.

Which software controls the interaction between the user and the hardware?

The system software is known to be made up of the Operating system (OS).

The function of the Operating system (OS) is that it is a kind of a software that helps to controls as well as handle  and coordinates the computer hardware devices and it also function by helping to runs other software as well as applications on a computer.

Therefore, The system software controls the interactions between hardware and user applications.

Learn more about system software  from

https://brainly.com/question/24321656
#SPJ1

Expressed as a power of two, there are ____________ megabytes in a terabyte. use a ^ to indicate an exponent, like 2^3 is 2 to the 3rd power.

Answers

Expressed as a power of two, there are  2^20 megabytes in a terabyte. use a ^ to indicate an exponent, like 2^3 is 2 to the 3rd power.

As anyone who has ever dealt with large amounts of data knows, storage is crucial. And when it comes to storage, size matters. A lot.

That's why it's important to know that a terabyte is equal to 2^20 megabytes. In other words, a terabyte is a whopping 1,048,576 megabytes.

For context, a megabyte is equal to 1,000,000 bytes, so a terabyte is equal to 1,048,576,000,000 bytes. That's a lot of data.

In practical terms, this means that a terabyte can store upwards of 2 million high-resolution photos, or 250 hours of high-definition video.

So, if you're dealing with large amounts of data, be sure to keep this number in mind. A terabyte is a lot of storage space, and it's important to know just how much data that really is.

Learn more on storage space here:

https://brainly.com/question/27837430

#SPJ4

Write an example of a salutation? I

Answers

Answer:

FORMAL: Dear Sergeant Ballard

Informal: Hey Doug,

Explanation:

A salutation is a greeting. It is the first part of a letter. I know this because I had business Computer 2 years ago for my first year in high school, and now my brother is taking the class.

_____ compress data so that it can be transmitted in a fast and efficient manner and then decompress it when it is to be read or played back.

Answers

Codec compress data so that it can be transmitted in a fast and efficient manner and then decompress it when it is to be read or played back.

In computing, a codec is a computer program that encodes or decodes digital data. The term codec is a portmanteau of "coder-decoder". A codec encodes data for transmission, storage or compression, or decompresses and plays back encoded data.

There are many different codecs available, each with its own advantages and disadvantages. Some codecs are better suited for certain types of data than others. For example, video codecs are designed to compress moving images, while audio codecs are designed to compress audio data.

When choosing a codec, it is important to consider the file size, the quality of the encoded data, the CPU usage, and the compatibility with the playback software.

Learn more on codec here:

https://brainly.com/question/14338673

#SPJ4

In a print statement, you can set the ________ argument to a space or empty string to stop the output from advancing to a new line. newline end separator stop

Answers

In a print statement, you can set the end argument to a space or empty string to stop the output from advancing to a new line. newline end separator stop.

What is a print statement?

The print statement is known to be an element or a tool that is often used to send output to a given standard output unit.

This can be your monitor, or even your printer  of a given computer system.

Therefore, In a print statement, you can set the end argument to a space or empty string to stop the output from advancing to a new line. newline end separator stop.

Learn more about print statement from

https://brainly.com/question/27221616

#SPJ1

The mark i was considered a highly sophisticated calculator instead of a computer because?

Answers

It is because the Mark I could not make decisions about the data it processed.

A general-purpose electromechanical computer called the Harvard Mark I, also known as the IBM Automatic Sequence Controlled Calculator (ASCC), was utilized in the last stages of World War II.

John von Neumann started one of the first programs that ran on the Mark I on March 29, 1944. Von Neumann had to decide whether implosion was a practical method for igniting the atomic bomb that would be deployed a year later while working on the Manhattan Project at the time.

The Mark I could also compute and print mathematical tables, which was what British inventor Charles Babbage had intended when he created his "analytical engine" in 1837.

Learn more about the history of computers https://brainly.com/question/14667239?

#SPJ4

In the blank______ age, infinite quantities of facts are widely available to anyone who can use a computer.

Answers

In the option B. information age, infinite quantities of facts are widely available to anyone who can use a computer.

Why is it called the Information Age?

This is known to be the time period in  history that is said to be called the Information Age.

It was called so due to the fact that it makes a lot of things available such as the instant access to knowledge as it could have been difficult or very hard to find formerly.

Therefore, In the option B. information age, infinite quantities of facts are widely available to anyone who can use a computer.

Learn more about information age from

https://brainly.com/question/10385855

#SPJ1

In the _________ age infinite quantities of facts are widely available to anyone who can use a computer.

A. intelligence

B. information

C. people

D. knowledge

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. What is the minimum number of bits needed to assign a unique bit sequence to each staff member?.

Answers

An office uses an application to assign work to its staff members. The application uses a binary sequence to represent each of 100 staff members. The minimum number of bits required to assign a unique bit sequence is 7.

This means that the office can have up to 2^7, or 128, different staff members. This is a pretty small office, and it's likely that they'll never have more than 100 staff members, so they don't need to worry about running out of space.

This means that each staff member can be assigned a unique work assignment with just 7 bits. This is a very efficient way to assign work, and it ensures that each staff member gets a unique assignment.

Learn more on bits here:

https://brainly.com/question/28214531

#SPJ4

A variety of memory cards and flash drives can be classified as _____ storage, which stores data in a nonvolatile, erasable, low-power chip.

Answers

A variety of memory cards and flash drives can be classified as Solid state storage, which stores data in a nonvolatile, erasable, low-power chip.

What are memory cards?

A memory card is known to be  a type of storage device that is known to be used for saving media as well as data files.

Note that this is a tool that helps to give  a permanent as well as non-volatile tool to be able to save data and files from any attached device.

Therefore, A variety of memory cards and flash drives can be classified as Solid state storage, which stores data in a nonvolatile, erasable, low-power chip.

Learn more about memory cards from

https://brainly.com/question/21708725

#SPJ1

This problem can sometimes be caused by disabling or refusing to accept cookies.

Answers

"The Page isn’t Redirecting Properly” Message is a problem that can sometimes be caused by disabling or refusing to accept cookies. Something went wrong if you experience the issue in your web browser.

The message basically signifies that the website keeps getting cycled through numerous addresses and may have become stuck in an infinite loop, which prevents you from accessing the website you wanted to.

In some cases, turning off or rejecting cookies can lead to this issue. The issue could be resolved by deleting your cookies for this site or permitting cookies from third parties.

An illustration of how cookies are used has been given on the link below

https://brainly.com/question/28142160

#SPJ4

_____ often function as standards or procedures to be used when configuring or maintaining systems.

Answers

The security policies often function as standards or procedures to be used when configuring or maintaining systems.

What is in a security policy?

A security policy is known to be a kind of a written document  that is know to be made by an organization stating how one can protect the organization from any form of threats, such as computer security threats, and how to handle cases when they do happen.

Note that A security policy need  to identify all of a firm's  assets and also all the likely threats to those assets.

Therefore, The security policies often function as standards or procedures to be used when configuring or maintaining systems.

Learn more about security policies  from

https://brainly.com/question/14469263

#SPJ1

What are the major activates of operating systems with regard to file management?

Answers

Creating, deleting, manipluation, backing up file and mapping to permanent storage are the major activities of operating systems with regard to file management.

File basically refers to collection of specific information stored in the memory of computers and file management refers to the process of manipulating these files, such as  creating, modifying and deleting files.

Following are the five major activities of all operating systems in regard to file management :

Creating and deleting files:  This service creates new files and places them at the particular locations. Also it deletes unnecessary files.Creating and deleting directories: This function helps to store the files in separate folders known as directories that support users to search files quickly. Also deleting files from directories is performed by this activate.File manipulation instructions: It provides functionality to manipulate files and directories, such as modifying the data on files and changing  file names in the directories.Mapping to permanent storage: It helps in mapping files onto secondary storage so that the files can be located easily and quickly.Backing up files: This service prevents data loss by providing a backup facility of data on stable and secure storage devices.

File management is one of the basic and important functions that all operating systems perform. Therefore, creating, deleting, backing up and manipulation are the major activities of operating system regarding files management.

You can learn more about file management at

https://brainly.com/question/12736385

#SPJ4

How do clustered systems differ from multiprocessor systems? what is required for two machines belonging to a cluster to cooperate to provide a highly available service?

Answers

In order to complete a distributed computational task, clustered systems are often built by fusing several computers into a single system.

On the other hand, multiprocessor systems could be a single physical object made up of numerous CPUs.

A multiprocessor system is more strongly coupled than a clustered system. While the processors in a multiprocessor system might be able to interact using shared memory, clustered systems require messages.

The state on the two machines needs to be copied and regularly updated for two machines to deliver a highly available service. If one of the machines breaks down, the other might step in to take over.

Learn more on clustered systems here:

https://brainly.com/question/26150121

#SPJ4

what does an operating system do

Answers

Answer: An operating system manages and runs all of the hardware and software installed onto the computer.

Explanation:

It performs basic tasks such as file, memory, and process management, handling input and output, and controlling peripheral devices such as disk drives and printers.

______ describes the way a document is printed or displayed on a screen.
Options are:
Red, Thesaurus, Mailing, Page Orientation, Track Changes.

Answers

Answer:

Page orientation.

Explanation:

Because the other words have nothing to make sense in this sentence.

In the tcp/ip model, what layer is considered so simple that it is ignored entirely?

Answers

In the tcp/ip model, what layer is considered so simple that it is ignored entirely is the Physical layer.

What is the Physical layer of tcp/ip model?\

The Physical Layer is known to be called the smallest or the lowest layer of the TCP/IP model.

Note that it is one that helps to handle  data in the form of bits and this  layer helps to deal with the host to host communication in any given network.

Therefore, In the tcp/ip model, what layer is considered so simple that it is ignored entirely is the Physical layer.

Learn more about tcp/ip model from

https://brainly.com/question/17387945

#SPJ1

In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Physical b. Data Link c. Application d. Network

A descriptive summary measure computed to describe a characteristic of the entire population is called:________

Answers

A descriptive summary measure computed to describe a characteristic of the entire population is called a statistic.

Using sample data, a statistic is a numerical descriptive measure. A parameter is a quantitative way to describe a population. Since whole populations (N) aren't always possible, we must rely on samples (n) and the statistics that can be calculated from them.

A sample statistic, or simply a statistic, is a summary measure computed for a sample data set.

Brief informative coefficients known as descriptive statistics are used to sum up a particular data set, which may be a sample of a population or a representation of the complete population. Measurements of central tendency and measures of variability make up descriptive statistics (spread).

Learn more about summary:

https://brainly.com/question/27029716

#SPJ4

Danielle wants to record a voice-over to add to a presentation. Other than a microphone, what does danielle need to record the audio?.

Answers

Danielle wants to record a voice-over to add to a presentation. Other than a microphone, he needs an audio recorder software to record the audio.

Programs called audio recording software can record any sound. These programs provide audio manipulation in order to meet project requirements. You can make, listen to, or play around with sound files using this software.

Numerous audio recording devices can use microphones to record speech, music, and other sounds for a variety of purposes, including various types of communications.

Follow the link below to learn more on audio recording devices

https://brainly.ph/question/24522253

#SPJ4

In linux, in the /dev directory, devices that start with sd can be associated with what type of device? check all that apply

Answers

In Linux computer system, in the /dev directory, devices that start with sd can be associated with this type of device:

Hard drivesUSB drivesMemory sticks

What is a directory?

A directory is also referred to as a folder and it can be defined as a document that is typically used for storing and organizing a file on a computer system.

What is a hard-disk drive?

A hard-disk drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed in a computer system.

On all Linux computer system, the /dev directory is a command that is generally associated with mass storage devices and as such it can be used to manage all of the following devices that start with sd:

Hard drivesUSB drivesMemory sticks

Read more on Linux computer directory here: https://brainly.com/question/25704515

#SPJ1

Complete Question:

In Linux, in the /dev directory, devices that start with sd can be associated with what type of device? Check all that apply.

Speakers

Hard drives

USB drives

Memory sticks

The ____ orders data and instructions from cache or ram based on the current task.

Answers

The prefetch unit orders data and instructions from cache or ram based on the current task.

Prefetch is a feature, introduced in Windows XP and still used in Windows 10, that stores specific data about the applications you run to help them start up faster. Prefetch is an algorithm that helps anticipate cache errors (when Windows requests data that is not stored in the disk cache), and stores that data on the hard disk for easy retrieval.

Superfetch is a feature that tries to determine which application you are going to launch and then loads all the necessary files and data into memory. Both of these features require several read and write operations to function.

You can learn more about Prefetch Windows here https://brainly.com/question/9810355

#SPJ4

Which windows feature, introduced in windows 95, helped eliminate device resource conflicts and precluded manual device configuration with jumpers?

Answers

The windows feature, introduced in windows 95, helped eliminate device resource conflicts and precluded manual device configuration with jumpers is known to be  called option b. Plug and Play.

What is meant by plug and play?

Plug and Play (PnP) is known to be an aspect of Windows that helps any  computer system to be able to adapt to hardware alterations with low intervention by a given user.

Note that user is one who can be able to can add as well as remove devices without to use of manual configuration, and without having the  knowledge of computer hardware.

Hence, The windows feature, introduced in windows 95, helped eliminate device resource conflicts and precluded manual device configuration with jumpers is known to be  called option b. Plug and Play.

Learn more about device configuration from

https://brainly.com/question/14949260
#SPJ1

consider a binary symmetric channel that delivers a transmitted bit correctly with probability 1 − p and flips it with probability p (see fig. 1). consider a repetition code over this channel that transmits every bit n times. in other words, bit 0 is transmitted using codeword 00 . . . 0 | {z } n zeros and bit 1 is transmitted using codeword 11 . . . 1 | {z } n ones . a receiver can detect an error if the received codeword does not match any of these two possible codewords. what is the probability that the error occurs but the receiver is unable to detect it?

Answers

Answer:

Explanation:

you would probly send either a 0 or a 1. And the 0 either gets decoded correctly (prob 1-p) or incorrectly (prob p). The same is true for the decoding of 1.

What Is Classification of Computers?

Answers

Answer:

Explanation:Sr.No.

Type

Specifications

1

PC (Personal Computer) or Micro-Computers

It is a single user computer system having a moderately powerful microprocessor. It is termed as a computer that is equipped microprocessor as its CPU.

2

Workstation

It is also a single user computer system, similar to the personal computer, however, has a more powerful microprocessor.

3

Mini-Computer

It is a multi-user computer system, capable of supporting hundreds of users simultaneously.

4

Main Frame

It is a multi-user computer system, capable of supporting hundreds of users simultaneously. Software technology is different from minicomputer.

5

Super-Computer

It is an extremely fast computer, which can execute hundreds of millions of instructions per second.

Enterprise information systems are also known as collaborative systems. true /false

Answers

Enterprise information systems are also known as collaborative systems is a false statement.

What systems are also known as enterprise systems?

An enterprise system is known to be a term that is said to be also known as an enterprise resource planning (ERP) system.

Note this enterprise system is seen as a kind of a cross-functional information system that tends to give organization a form of larger scope as well as the coordination and the integration of some central business processes and aid them in the area of planning the resources of any given organization.

Note that Enterprise information systems are also known as collaborative systems is a false statement because it is an enterprise resource planning (ERP) system.

Learn more about Enterprise information systems from

https://brainly.com/question/14688347
#SPJ1

Design an algorithm for function to find the longest substring which contains 2 unique characters in a given stirng. you may list steps or psuedo code.

Answers

The fake code consists of the following two classes: public class LongestSubstr and import java.util.HashSet.

How Do Algorithms Work?

An algorithm is a process used to carry out a computation or solve a problem. In either hardware-based or software-based routines, algorithms function as a detailed sequence of instructions that carry out predetermined operations sequentially. All aspects of information technology employ algorithms extensively.

An algorithm is a series of instructions for completing a task or solving a conundrum.A common example of an algorithm is a recipe, which includes thorough instructions for making a dish or meal.An algorithm is a method for performing calculations or finding solutions to issues.Algorithms perform as a precise set of instructions that carry out preset activities consecutively in either hardware-based or software-based routines.Algorithms play a big role in information technology across the board.

Introduction to Algorithm Types:

Algorithm using brute force. Avaricious algorithmAlgorithm with recursion.

To learn more about algorithm, refer to:

https://brainly.com/question/13800096

#SPJ4

To represent 9 different colours, what is the minimum
colour depth needed? Give your answer in bits.

Pls help!!

Answers

Answer:

4 bits

Explanation:

3 bits gives you 8 combinations, which is not enough.

4 bits gives you 16 combinations.

n bits gives you 2ⁿ combinations in general.

To represent 9 different colors, the minimum color depth needed is 4 bits.

A bit is the smallest unit of digital information, representing either a 0 or a 1 in binary code.

In computing, bits form the foundation of data storage and processing, enabling the representation of complex information through combinations of 0s and 1s.

To represent "n" different colors, there is a need to find the smallest "k" such that [tex]2^k[/tex] is greater than or equal to "n."

For this case, n = 9 (since there are 9 different colors).

Now, we find the smallest "k" such that [tex]2^k \le 9[/tex]:

[tex]2^k = 2^3 \\[/tex]

= 8 (with 3 bits, we can represent 8 different colors)

[tex]2^4[/tex] = 16 (with 4 bits, we can represent 16 different colors)

Since 4 bits ([tex]2^4[/tex]) is the smallest power of 2 that is greater than or equal to 9, the minimum color depth needed to represent 9 different colors is 4 bits.

Learn more about bit here:

https://brainly.com/question/13014227

#SPJ7

two examples of how scientists, technologists, engineers, and mathematicians may work together to create a new product

Answers

Answer:

Which places were Included in Nepal by Pratap. Singh Shah in his short rule

After establishing fields and criteria, execute your query by clicking the _____ button in the _____ group.

Answers

After establishing fields and criteria, execute your query by clicking the Click the Run button in the Results group.

What is mean by query in SQL?

The term  query is known to be a kind of a request that is said to be made for data or information that can or that need to be obtained from a database table or combination of tables.

Note that this data may be made as results that are known to have been  returned by Structured Query Language (SQL) or as a kind of a pictorials, graphs or hard results,

Therefore, based on the above, After establishing fields and criteria, execute your query by clicking the Click the Run button in the Results group.

Learn more about query from

https://brainly.com/question/25694408

#SPJ1

Other Questions
A chain of activities performed by the organization to transform inputs into outputs valued by the customer is:__________ A rectangle's width is 6 feet less than its length. Write a quadratic functionthat expresses the rectangle's area in terms of its length.A. A(1)=1-61B. A(7)=7wc. A(1)=12+61D.A(7)=1-6 26) Jody earns $8.00 per hour.Michael earns $10.00 per hour.They each earn a 2% commission on what they sell.Jody sold $6000. She worked 30 hours.Michael sold $5000. He worked 40 hours.What were each of their earnings for the week?What was the difference in their earnings? Enzymes that use oxidation to convert food materials into energy are found in sausage-shaped structures called __________. Error Analysis You and a friend are doing math homework together. You have to solve the equation 5x + 4x - 68 = 34 - 8x. Your friend arrives at the incorrect answer x = -2. Find the correct value of x. Then find the error your friend possibly made. X x=0 What possible error could your friend have made to get x = -2? OA. Your friend should have added 68 to each side of the equation, but instead subtracted 68 from the right side. OB. Your friend should have added 8x to each side of the equation, but instead subtracted 8x from the left side. OC. Your friend should have added 5x and 4x to get a sum of 9x, but instead got a sum of 8x. *PLS HELP*A student is given the rectangle and the square shown. The student states that the two figures have thesame perimeter. Is the student correct? Complete the explanation to explain your reasoning.X+4XX+2X+2The student is (select) The perimeter of a figure is found by (select)For the rectangle, the perimeter is. For the square, the perimeteristhe lengths of its sides. Which instruction would the nurse include in a teaching plan for a client who is taking an oral hypoglycemic daily? These are organizations that invest in equity capital that is not traded in public exchanges. Is -1.5 greater than 2.1 18. What is the mass of an object with a density of 2.44g/ml and a volume of25ml?a. 61gb. 61.0gc. 10.2gd. 0.098g After reviewing information about antihyperlipidemic drugs, a group of nursing students demonstrate understanding when they identify which medication as a fibric acid derivative (fibrate)? What is the best definition of a phrase?A group of words with a subject and a verb; if removed, the sentence meaning is affected.A group of words with a subject and a verb; if removed, the sentence meaning is not affected.A group of words without a subject and a verb; if removed, the sentence meaning is affected.A group of words without a subject and a verb; if removed, the sentence meaning is not affected. Reasons why human sacrifice should be abolished The idea that some basic businesses such as steel mills, coal mines and utilities, should be owned and controlled by the government is indicative of a economic system. True or false?. When consumers reduce spending, the reduction in the velocity of money is split between? Solve the inequality.3w-5>2w+w-71. w-22. All real numbers3. No solution4. w-2 Kubin Companys relevant range of production is 12,000 to 16,000 units. When it produces and sells 14,000 units, its average costs per unit are as follows: Average Cost per UnitDirect materials $ 7.30Direct labor $ 4.30Variable manufacturing overhead $ 1.80Fixed manufacturing overhead $ 5.30Fixed selling expense $ 3.80Fixed administrative expense $ 2.80Sales commissions $ 1.30Variable administrative expense $ 0.80Required:1. Assume the cost object is units of production:a. What is the total direct manufacturing cost incurred to make 14,000 units?b. What is the total indirect manufacturing cost incurred to make 14,000 units?2. Assume the cost object is the Manufacturing Department and that its total output is 14,000 units.a. How much total manufacturing cost is directly traceable to the Manufacturing Department?b. How much total manufacturing cost is an indirect cost that cannot be easily traced to the Manufacturing Department?3. Assume the cost object is the companys various sales representatives. Furthermore, assume that the company spent $39,200 of its total fixed selling expense on advertising and the remainder of the total fixed selling expense comprised the fixed portion of the company's sales representatives compensation.a. When the company sells 14,000 units, what is the total direct selling expense that can be readily traced to individual sales representatives?b. When the company sells 14,000 units, what is the total indirect selling expense that cannot be readily traced to individual sales representatives?2. Assume the cost object is the Manufacturing Department and that its total output is 14,000 units.a. How much total manufacturing cost is directly traceable to the Manufacturing Department? (Round per unit values to 2 decimal places.)b. How much total manufacturing cost is an indirect cost that cannot be easily traced to the Manufacturing Department?Show less2a. Direct material cost per unit 2a. Direct labor cost per unit 2a. Variable manufacturing overhead per unit 2a. Fixed manufacturing overhead per unit 2a. Total manufacturing cost per unit $0.002a. Number of units produced and sold 2a. Total direct costs $02b. Total indirect costs Exercise 1 Suggest a market for the writing described below. an opinion piece concerning the schools curriculum In a perfectly competitive market, a firm operating in the long run is forced by competition to adjust its scale of operation:______. The reflective quality of a surface is known as its :________ a. absorption b. conduction c. scattering d. albedo e. specific heat