What is the maximum number of guesses it will take to find a number
between 1 and 64?

Answers

Answer 1

Answer:

10?

Explanation:


Related Questions

A) the Operating system is said to provide security. Explain what this means and give an example of a security feature.

Answers

It means that thw operating system is up to date with all the lastest protection systems like an anti virus. An example is that the operating system has a built in ransomware protection system ib place.

Hope this help please give the brainliest award

When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________. When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________.

Answers

Answer:

It is called a driver.

Explanation:

in 2014, what percentage of the world population has access to the internet?

Answers

Answer:

At that time 43.9% of people have access to the global internet.

Easy Question I will make you brainless Just answer this 10 question!!​

Answers

Answer:

B

Sc

B

Sc

B

B

Sc

B

Sc

Sc

Explanation:

Not positive sorry if its not 100% correct

did someone really hang themselves on wizard of oz

Answers

Answer:

Yes they did

Explanation:

If you look closely in the back, in the part where they sing where off to see the wizard the wonderful wizard of oz. Just look behind dorothy's head and you will see a man hanging himself

Language modeling incorporates rules of __. Select all that apply.

A. story structure

B. grammar

C. dictionary definitions

D. pronunciation patterns

Answers

Language modeling incorporates rules of grammar and pronunciation patterns

Language modeling  is simply known to use rules of grammar, known pronunciations, and other patternsIt seeks to know the given probability distribution of all linguistic units such as words, sentences.  is main work is to predict the next word that is to come in a document.It makes use of grammar principles and the various forms of pronunciation in its task.

Conclusively, we can say that Language modeling incorporates rules of grammar and pronunciation patterns

Learn more from

https://brainly.com/question/6214562

what information most likely presents a security risk on your personal

Answers

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

Date of birth.Occupation.Religion.Gender (sex).Location.Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: https://brainly.com/question/21765376

What language do programmers use to communicate with a computer?

Input code
Linguistic code
Programming code
Virtual code

Answers

Answer:

I would say programming code

Explanation:

Since its a system of rules written in a particular programming language

The language that programmers use to communicate with a computer is called "Programming code".

The correct option is C.

Programming code is the language that is used by developers to create software programs, applications, and websites. These languages are based on a set of instructions that tell the computer what to do.

Programming languages can be divided into two categories: low-level and high-level.

Low-level languages are closer to the binary code that computers use to execute instructions.

High-level languages are more abstract and easier for humans to understand and use.

Examples of high-level languages include Python, Java, JavaScript, and C++.

Programmers use programming languages to create algorithms and procedures that the computer can follow to complete tasks. This involves writing code that is syntactically correct and logically sound. Once the code is written, it must be compiled or interpreted by the computer so that it can be executed.

Know more about programming language,

https://brainly.com/question/23959041

#SPJ3

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

which of the following is the most reliable storage device:
floppy disk
hard disk
USB
RAM

Answers

Answer:

RAM is the most reliable storage device.

A pennant-shaped sign means you are in a _____ zone.

Answers

Answer:

The pennant-shape is only used as a road sign to signal a no-passing zone. No passing zones are stretches of roadway where drivers are not allowed to move into the adjacent lane to pass a vehicle in front.

you can use view the ______ file to view the hard drive details.

Answers

Answer:

/proc/partitions

A mouse that emits and sense light to detect its movement is called an _______________ mouse.​

Answers

The answer is: “optical” mouse

Explanation:

optical mouse:

uses devices that emit and sense light to detect the mouse's movement

ASAP PLS HELP: I’ll give brainliest if you u answer them all correctly!!


1. A means of giving credit to a source when their information is used.

A) Citation
B) Wi-Fi
C) Asynchronous Communication
D) Malware

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.
A) Spyware
B) Phishing
C) Malware
D) Wi-Fi

3. A device that translates analog carrier signals to encode and decode digital information.

A) USB
B) Computer Virus
C) Intranet
D) Modem

4. A virus or Trojan horse designed to cause harm to computer or device.

A) Hardware
B) Malware
C) Modem
D) Antivirus Application

5. Software that is used to detect and eliminate computer viruses.

A) Wi-Fi
B) Cable Internet
C) Antivirus Application
D) Browser

6. Transmits data through a cable television network as a means to connect a computer to the internet.

A) Desktop Interface
B) Cable Internet
C) Operating System
D) USB

7. An application used to access websites on the internet.

A) Malware
B) Internet
C) Proprietary
D) Browser

8. Communication that does not happen in real time.

A) Asynchronous Communication
B) Wi-Fi
C) Ethernet Cable
D) Malware

9. A network of computers that provides access to information on the web.

A) Phishing
B) Internet
C) Antivirus Application
D) Modem

10. The cable used to connect computers in a network.

A) Computer Virus
B) Ethernet Cable
C) Intranet
D) Hardware

Answers

Easy Peasy Lemon Squeezy

1. A means of giving credit to a source when their information is used.

A.) Citation

2. A malicious attack that uses email, text messaging, and websites to gather sensitive information about people.

B.) Phishing

3. A device that translates analog carrier signals to encode and decode digital information.

D.) Modem

4. A virus or Trojan horse designed to cause harm to computer or device

B.) Malware

5. Software that is used to detect and eliminate computer viruses.

C.) Antivirus Application

6. Transmits data through a cable television network as a means to connect a computer to the internet.

B.) Cable Internet

7. An application used to access websites on the internet.

D.) Browser

8. Communication that does not happen in real time.

A.) Asynchronous Communication

9. A network of computers that provides access to information on the web.

B.) Internet

10. The cable used to connect computers in a network.

B) Ethernet Cable

Answer:

your mom

Explanation:

you type out a few sentences in an ms word file, and save it on your desktop. how is this data stored in the computer?

Answers

When one is  typing on MS word and one save the file, this data would be stored as combination of 1s and 0s in the computer.

Computer data storage can be regarded complex system, immediately a data is saved then;

The first be converted to simple numbers of 1s and 0s , this number are very easy for a computer to store and these number are regarded as Binary Numbers and all letters as well as photographs are converted to numbers,

The hardware will record this saved numbers inside the computer.

These numbers are then  organized and transferred to temporary storage which be manipulated by programs, or software.

Therefore, data are been stored as 1s and 0s in the computer.

Learn more at:https://brainly.com/question/21571591?referrer=searchResults

Can someone check my answers?
I got 4 for c and 17 for d​

Answers

Answer:

both are correct

Explanation:

what is the arrangement of various flash elements, such as the tools panel, control panel, property inspector and stage

Answers

Answer:

could have used a browser  but ok

Explanation:

The arrangement of various flash elements such as the tools panel control panel property inspector and windows is called the Workspace. Explanation: The workspace in a computer system makes us easy to navigate to different features and control options.

Describe the type of gameplay seen during early video games

Answers

Answer:

2d?

Explanation:

It could be 2D because most games such as early Mario and Donkey Kong games were 2D games.

Answer: Arcade Machines

The earliest gameplay video games were arcade machines such as Mario, Donkey Kong, and PacMan. Most early video games being produced by Nintendo.

PLS HELP ASAP ILL GIVE THANKS AND BRAINLIEST IF YOU GET THEM ALL RIGHT:

1. Software used to search a database using keywords or phrases entered by the user.
A) Navigation Tracking
B) Network
C) Search Engine
D) Ethernet Cable

2. This is used to mark a web pages structure using tags so that the web browser displays the content correctly.

A) Antivirus application
B) Ethernet cable
C) Computer virus
D) HTML

3. this is used to connect devices like printers, keyboards, external storage, and digital cameras to computers.

A) Modem
B) USB
C) Intranet
D) Desktop Interface

4. software that the owner maintains exclusive control over how it is modified and distributed

A) proprietary
B) navigation tracking
C) Spyware
D) operating system

5. set of principles that help users determine what is right or wrong in regards to computers.

A) modem
B) HTML
C) navigation tracking
D) Computer ethics

6. spyware that manages all of the installed applications and hardware on a computer or device.

A) Computer virus
B) operating system
C) citation
D) HTML

7. physical components of a computer system such as computer, mouse, or modem.

A) software
B) Network
C) browser
D) hardware

8. A malicious software program that spies on the user and share the information with a third-party.

A) antivirus application
B) malware
C) spyware
D) Desktop interface

9. icons and menus on the computer that allow the user to interact with the operating system.

A) Desktop interface
B) intranet
C) navigation tracking
D) Computer ethics

10. A tool that provides directions using satellites

A) asynchronous communication
B) navigation tracking
C) Ethernet cable
D) HTML

11. A restricted private network used by organizations to communicate.

A) asynchronous communication
B) navigation tracking
C) intranet
D) browser

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

12. content that is not owned by any individual or company that is free to use.

A) network
B) proprietary
C) Desktop interface
D) public domain

13. A software program that is loaded onto a computer and then duplicates itself spreading and impacting programs and files on the computer

A) Cable Internet
B) Computer virus
C) public domain
D) operating system

Answers

This is a lot, but here goes!

1. C

2. D

3. B

4. A

5. D

6. B

7. D (these are technically peripherals or input devices.)

8. C

9. A

10. B

11. A

12. D

13. B

Just as a note, spyware is malware.

____ describes the period of time in a twenty-four-hour period that is spent at work.

Answers

I believe "Work-Shift" should be in the blank

how can an attacker execute malware through a script?

Answers

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

what is my assurance wireless account number and pin

Answers

Answer:

Call Assurance Wireless at 1-(888)-898-4888 to access your account number. Your PIN is the 6-digit (or 10-digit) number you created, which is located on your welcome letter. Your account number can be found in the top right corner of any bill or by logging into your online account. Do not enter any dashes or hyphens.

Explanation:

pls mark as brainliest and hope this helps

It should be noted that your assurance wireless account number can be found at upper right-hand corner of any bill, and the PIN is the 4 digits that was given to the carrier during the call in.

According to the question, we are to discuss how individuals can know his assurance wireless account number as well as the pin.

As a result if this we can see that the Account number can be obtained at  upper right-hand corner of bill as well as invoice, and the pin is usually 4 digit number.

Therefore, your assurance wireless account number upper right-hand corner of any bill.

Learn more about wireless account number at:

https://brainly.com/question/13162939

________ is the use of information technology to support the sharing of content among networks of users.

Answers

Answer:

The social media is the use of IT to support the sharing of content among network of users.

qbasic program to check whether the given number is odd or even​

Answers

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Answers

Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Certificate authority (CA) is simply known as a firm (entity) that has the sole aim for digital certificates.

Certificates often uses centralized third parties called certificate authorities such as x.509 certificates. There are several fields in x.509 and these certificates consist of several characteristics that is perculiar to them.

From the above, we can say that Certificate attributes are simply known as the name of the Fields in an x.509 digital certificate that are used when parties negotiate a secure connection.

Learn more from

https://brainly.com/question/17956104

Draw a logic gate circuit for each of the following Boolean expressions.
1- F= AB’
2-F = A’ + (B*C)
3-F= (A*B) + (A*C)

Answers

Answer:

can you explain more please I didn't understand

what does it mean to clear a setting in a dialog box?

Answers

Answer:

to delete it

Explanation:

Why do we collect feedback on the code we write?

Answers

Answer:

to improve our code

Explanation:

"To improve our code" we collect feedback on the code we write.

Collecting feedback helps the users to learn whatever your consumers think approximately company reputation, performance, as well as merchandise or their items.Going beneath their basic likes as well as their dislikes and assisting you in understanding and evaluating wherever you may grow and where the business position in comparison to your competition.

Thus the above answer i.e., "option a" is correct.

Learn more about feedback here:

https://brainly.com/question/1603365

how much did netflix pay dave chappelle for the closer

Answers

$24.1 million dollars

a file extension of .xlsx means that the file contains what?

Answers

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

Answer:

Explanation:

A .xlsx file tells you that the file is an Excel workbook that utilizes XML files to create the various spreadsheets as well as macros and other hidden codes used to perform certain functions (which is why there's an X at the end; older .xls files had no indication of this external code being present, which is why they're almost never recommended for modern use).

Other Questions
Pls helpAn elephant at an animal sanctuary weighs 5.5 tons. He receives a daily nutritional supplement. The instructions say to give 1 fluid ounce of supplement for every 250 pounds of body weight. How many fluid ounces of supplement should the elephant receive? no options I need to type it in. If 1/2 gallon of paint covers 1/8 of a wall, then how many quarts of paint are needed for the entire wall? Mr. Strand mowed 2 5 of his lawn. His son mowed 1 3 of it. Who mowed most of the lawn? How much of the lawn still needs to be mowed? Saul is testing an installation and discovers a short circuit. What's causing this?A. High currentB. High voltageC. Low voltageD. Low resistance Can you help Please? Events in which molten rock spews out of the mantle as ash, lava, and gases A company wants to set up operations in a country with the following corporate tax rate structure: Taxable Income Tax Rate $100,000 39% Therefore, a taxable income of $60,000 would result in taxes due of $50,000*0.15 + ($60,000-$50,000)*0.25 = $50,000*0.15 + $10,000*0.25 = $10,000 If the compay expects gross revenues of $300,000, $150,000 in total costs, $20,000 in allowable tax deductions and $6,000 in a one-time business start-up credit, how much should the company expect to pay in taxes? find the missing side lengths Pretend you are ordering at a restaurant. Which of the following choices would result in the waiter bringing you a cookedfood?Un caf, por favor.Las frutas, por favor.O Una banana, por favor.O Pasta, por favor. Look at pic below please show work : ) Write two sentences that explain what this evidence tells you about Manjiros culture. Does ross believe what he tells lady McDuff please. very easy! will give brainliest Youre walking down the hall and you overhear someone talking about you behind your back. What would you do and why? To represent the number of squares after steps, Diego and Jada wrote different equations. Diego wrote the equation f(n)= (n+1) 2 . Jada wrote the equation f(n) = n 2+ 2n + 1. Are either Diego or Jada correct? Explain your reasoning. Please help! No links, No fake answers, No fake photo links, No fake files.You would have to read the documents than answer the questions. Also you have to show one piece of evidence for each question. (its not a project, it is only two questions)1- After reading document 1, what are some things Americans wanted in their homes once they got electricity (text evidence)? How did electricity affect spending habits & American life (own words)?2- According to Document 2, is it possible for the American economy to survive if people keep buying on credit at the rate that they have been (text evidence)? What are the dangers of buying on credit (own words)? ihioiggihhiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiiik How do preconceived notions impact the content of an editorial cartoon?A. They help you better understand the content displayed in the cartoon.B. They lay a foundation for the information that is illustrated.C. They interfere with the way you view the information.D. They allow you to draw conclusions accurately. can someone help me pls i put rhe question as a picture i would help alot Which word correctly completes the sentence below?We saw the terrible ______ of the big storm everywhere.adviceadvisesaffectseffects