Answer:
hope helpful
Explanation:
a
c
b
c
d
have a great day
please help me i give brainly
Answer:
I hope this is right, but it may not be so you might want to recheck your lesson, but i hope this helps you. Have a great day!
Explanation:
Ulrich has to present his findings on the music of modern Japan at school the next day. What is the BEST way for him to do this?
A.
A direct speech to the class
B.
A multimedia presentation with sound
C.
A written essay with image handouts
D.
An interactive workshop involving the class
Answer:
c
Explanation:
Lonnie needs to use a special kind of block in his game that will tell him whether an object has slammed into his car true or not false what kind of block should Lonnie use
Block in programming in other to evaluate a condition such that it returns a boolean upon which a statement or action is then taken is the conditional block . Hence, Lonnie should use the conditional block.
The conditional block evaluates a condition and gives a True or False output which can the be used perform any statement or action of choice.
Lonnie could use the block as follows :
if (object_slammed_into_car) :
Statement
else :
Statement
The statement could be replaced with True, False values or any output of choice.
Learn more : https://brainly.com/question/25264145
An analog video is a video signal transmitted by an analog signal, captured on a (blank)
Answer:Analog component signals are comprised of three signals, analog R′G′B′ or YPbPr. Referred to as 480i (since there are typically 480 active scan lines per frame and they are interlaced), the frame rate is usually 29.97 Hz (30/1.001) for compatibility with (M) NTSC timing.
Explanation:
what does the term attenuation mean in data communication?
Simple Answer: Loss of signal strength
Information: Attenuation is the loss of signal strength in networking cables or connections
PLEASE HELP THIS IS CONFUSING ME
Answer:
The answer is:
Yes, because Antonio clearly copied someone else's words.
Explanation:
It is still forbidden to plagiarize Wikipedia despite it being a Open-Source Data base of information. This means, unless you directly cite in a bibliography or with in-text citations, the article, the author, and everything else needed in the proper citations for the format, it is plagiarism.
Answer:
Yes, Antonio is plagirizing since he did not site the author of that specific Wikipedia Page.
Explanation:
Plagirisim can be avoided by citing the source of the paragraph, but you need to be specific by stating the author of the pargraph, and what the title of the webpage or book was. Otherwise, you can be suspect to prosecution and suspention at your school.
How does net neutrality protect your information? Do they connect everyone into something?
Answer:
Net neutrality law focuses on regulating and/or preventing three main practices:
Blocking: ISPs cannot block or prevent access to any lawful content on the web.
Paid prioritization: Providers cannot prioritize companies or consumers who pay a premium for a “fast lane” and keep those who don’t pay in a “slow lane.”
Throttling: Providers cannot limit your bandwidth or slow your connection based on your internet activities.
Without net neutrality or other laws protecting equal content, ISPs could, in theory, block certain websites and favor others. For example, your internet provider could theoretically make Netflix slower in order to push you towards its cable TV service.
Or, Xfinity could allow their subscribers to stream Peacock content (which they own through NBCUniversal) for free, while charging subscribers for watching Netflix. With net neutrality, you would have free and equal access to both Peacock and Netflix.
Another example would be your ISP slowing your connection every time you try to game over Twitch, but speeding it back up again when you’re not gaming, a practice known as throttling.
Explanation:
Answer: Net neutrality rules prevent this by requiring ISPs to connect users to all lawful content on the internet equally, without giving preferential treatment to certain sites or services. In the absence of net neutrality, companies can buy priority access to ISP customers.
Bob gets an e-mail addressed from his bank, asking for his user ID password. He than notices that the e-mail has poor grammar and incorrect spelling. He calls his bank to ask if they sent the e-mail, and they promptly tell him they did not and would not ask for that kind of infromation, What is this type of attack called
Answer:
A Fraud Attack(or scam :D)
Explanation:
EZ answers friend and put THANKS in my profile
Solve using the standard algorithm 758 x 92
The answer to the following problem using Standard Algorithm is 69,739. See the explanation below and the attached image.
How do you perform a standard Algorithm?A standard Algorithm means that you do the multiplication by hand. Traditional methods or standard algorithms involve multiplying numbers and ordering the result by bit value. Here are the steps to do long multiplication manually:
Arrange the numbers on top of each other and put the values in the columns. The number with the most digits is usually placed at the top as the multiplier.Start from one digit in the bottom digit, multiply by the last digit in the top digitWrite your answer under the equal signIf the answer is greater than nine, enter the number one as the answer and indicate the level numberContinue from right to left. Multiply one digit in the bottom digit by the next digit to the left of the top digit. If you carry a number with you, add it to the result and write the answer under the equal sign. If you must wear it again, please do. As you multiply ones by each digit of the top digit, move to the digit at the level of the bottom digit.Multiply as above, but this time write the answer on a new line and move one digit to the left. After multiplying, draw another answer line below the answer numbers in the last row.Add your column of numbers from right to left using long addition and carry as you would normally do long addition.Learn more about Standard Algorithm:
https://brainly.com/question/28626488
#SPJ1
when is not appropriate to be funny in a headline
Answer: I it is something serious like the death of a person then you should not be funny
plsssssssss help me
Answer:
1. physical hazard
2. psychological hazard
3. biological hazard
4. physical and/or psychological hazard
5. chemical hazard
6. physical hazard
7. chemical hazard
8. biological hazard
Explanation:
You do the rest
What is the value of x after running this code?
x = 0
for y in [1,2,3,4,5,6,7,8,9,10]:
x = x + y
counter = 1
sum = 0
while counter <= 6:
sum = sum + counter
counter = counter + 2
print(sum)
A. 12
B. 9
C. 7
D. 8
✔️ Correct! This loop executes 3 times. After the first loop sum = 1 and counter = 3, after the second loop sum = 4 and counter = 5, and after the third loop sum = 9 and counter = 7.
Why is it important to create a web maintenance schedule? Check all of the boxes that apply.
A, B, D
I just did it mate :)
what threat do insiders with authorized access to information or information systems pose
Answer:
Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.
Do a quick search for “The Sun”. What types of results do you see?
Answer:
What happens when you look at the Sun?
When you stare directly at the sun—or other types of bright light such as a welding torch—ultraviolet light floods your retina, literally burning the exposed tissue. Short-term damage can include sunburn of the cornea—known as solar keratitis. ... This occurs when UV light literally burns a hole in the retinal tissues.Oct
help help help
Read the list of courses from a technical school (w3schools).
Which courses would prepare for you for a career in web development?
(Choose more than one answer)
Designing for Usability
Introduction to Networks
Technical Writing
Cybersecurity
The courses that would prepare you for a career in web development are:
Designing for UsabilityTechnical WritingTo prepare for a career in web development, the following courses from a technical school like W3Schools would be beneficial:
Designing for Usability: This course focuses on user-centered design principles and techniques, teaching you how to create web interfaces that are intuitive, user-friendly, and visually appealing. It covers topics such as user research, information architecture, wireframing, and prototyping.Technical Writing: Effective communication is crucial in web development. This course teaches you how to write clear, concise, and well-structured technical documentation. You'll learn about writing for different audiences, organizing information, using appropriate language and style, and documenting code and processes.Taking these courses will help you develop important skills for a career in web development. Designing for Usability will enhance your ability to create user-friendly websites, while Technical Writing will improve your communication skills, enabling you to document and explain your work effectively.
Courses like Introduction to Networks and Cybersecurity may be valuable in other IT fields, but they are not directly related to web development and may not be as relevant to this specific career path.
For more such question on Designing
https://brainly.in/question/56183783
#SPJ8
WILL GIVE Brainliest!!!!
Select the six criteria for a baseline.
goal
future
defines
assessment
desired
beginning
score
progress
broad
start
Answer:
start
Explanation:
Answer:
desired
goal
progress
start
defines
future
Explanation:
What is computer specification
Answer:
Computer hardware specifications are technical descriptions of the computer's components and capabilities. Processor speed, model and manufacturer. Processor speed is typically indicated in gigahertz (GHz). The higher the number, the faster the computer.
what is a for command? can u use a variable instead of a number in the for command!
Answer:
A for loop is a block of code where a certain instruction repeats a certain amount of times.
Yes, you can use a variable instead of a number in a for loop.
Explanation:
For example, you're using a for loop and you want to repeat it a certain amount of times, but you want to take user input. You would ask the user for their input and assign it to a variable, then use that variable for the for loop.
most computers have temporary holding areas called __________.
Answer:
Random Access Memory (RAM)
mention two cables that connect the monitor to the system unit
what is know of father of computer
Answer: Charles Babbage is the father of the computer.
Explanation:
what is the process where a computer starts up and automatically loads the operating system
Answer:
What is Booting
Explanation:
The process of bringing up the operating system is called booting (originally this was bootstrapping and alluded to the process of pulling yourself up "by your bootstraps"). Your computer knows how to boot because instructions for booting are built into one of its chips, the BIOS (or Basic Input/Output System) chip.
Did this help?
Brainly, thank you, rating are all very much appreciated!
Smile ; ) - Miss Hawaii
Explanation:
The process of loading the operating system into memory is called bootstrapping, or booting the system.
plz help me
Marie has never used a word processor. in 3 to 4 sentences describe how she could benefit from using a word processor to complete school writing assignment.
Her info would be clear to read. This means it cold flow better, and make more sense when reading it. If she didn't use it, she might have unclear sentences.
What does elif mean? A. else B. if C. eliminate if D. else if
Answer:d
Explanation:
Answer:
D. else if
Explanation:
Elif is short for else if.....
how do ""night modes"" on computer screens help people fall asleep?
Answer:
it doesn't really help people fall asleep but
Explanation:
When it gets dark, your pineal gland secretes the hormone melatonin, which tells your body to get tired and go to sleep.
Answer:
Answer it doesn't really help people fall asleep but some people it can
Explanation:
Most people dont fall asleep while on computers but the people who do it helps because the screen is not all bright and doesn't keep your eyes wide open
what is the most popular game design engine today
Unreal Engine and Unity
Answer:
i think its an gamemaker
Explanation:
1.a computer can create an output based on the input of the user.
process store retrieve communicate personal computer desktop computer laptop computer netbook tablet smartphone server game consoles
Answer:
But users are very much aware of the input and output associated with the computer. They submit input data to the computer to get processed information, the output. Sometimes the output is an instant reaction to the input. ... The output is the computer's instant response, which causes the forklift to operate as requested.
You have answered 12 of 23 questions.
ing
1
Question # 13
A group of computers that share resources are called what?
2
O A server
3
O A personal computer
O A router
1
O A network
Read Question
Answer:
the answer is a network because the others are for different things
What are some limitations when it comes to testing and ensuring program quality? List at
least two limitations; you may refer to specific kinds of testing in your answer.
Answer:
the two limitation i can think about is the efficiency like if there are bugs or glitches or if it can get broken into and the second one is if it is running the correct program or not a lot of people deal with this problem.
Explanation: personally these are the two i can come up with at the moment
The two limitations that come arrive in the process of testing and ensuring program quality are as follows:
The errors and kinds of glitches in modern technology seem like distractions in usual life. The overdependency on these resources may harmful to a larger extent. What is Program quality?Program quality may be defined as the fundamental properties of the program's source code and executable code, including reliability, robustness, usability, portability, maintainability, efficiency, and readability.
According to the context of this question, there are various limitations in each and every field of development whether it is science or technology. Similarly, there are a lot of drawbacks in testing and ensuring program quality. You have to manage each and everything in a systematic way in order to ensure the testing of program quality.
To learn more about Program quality, refer to the link:
https://brainly.com/question/13381607
#SPJ2