I feel like we should create our own account for
security purpuoses it's a good idea for each user to have their own account. Everyone having their own account is better for security reasons. For instance no one can access anyone else's account without their password.
Your sister has just emailed you an attached file with the invitation list for her upcoming party.
Which of these tells you what type of file it is?
A. Folder name
B. File name
C. Extension
D. Call Number
Answer:
The file Extension so the answer is C
Draw a conceptual sketch of your laptop. Identify the keyboard, screen, power source, and storage device and etc. using arrows and labels.
Answer: 12345678910111213141516171819202122
Wht roles do computer play at home?
Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc. They provide communication through electronic mail.
The process of generating an image from a 2D or 3D model using computer programs is called ........
Answer:
endering or image synthesis is the process of generating a photorealistic or non-photorealistic image from a 2D or 3D model by means of a computer program. ... The term "rendering" is analogous to the concept of an artist's impression of a scene.
Can I please get an answer, it's for computer science.
Answer:
I believe the answer would be B. C. and D. A, wouldnt make sense, as GitHub doesn't have that as a feature. I hope this helps! :)
Answer:
ok im not 100% sure this is right but i also don't pay attention in any of my classes except music so i would maybe say options D,B, and A
Explanation:
If known vulnerabilities in software are entry points for an attacker, why are the software vulnerabilities not corrected before the software is released?
Answer:
we dont knoqw
Explanation:
The developer hasn't had enough time to address them, these flaws are referred to as "zero days." is the software vulnerabilities not corrected before the software is released.
What is software?Software is a set of instructions, information, or computer programs that are used to operate equipment and perform certain tasks. Hardware, which is a term for a computer's external components, is the opposite of it. In this usage, "software" refers to the running scripts, programs, and apps on a device.
The procedures and software that make it possible for a computer or other electrical equipment to operate are referred to as software. Examples of the processes and programs that make up a computer system are Excel, Windows, and iTunes.
System software consists of the programs and processes required to run the computer. System software, utility software, and application software are the three subcategories of software.
Thus, The developer hasn't had enough time to address them.
For more information about software, click here:
https://brainly.com/question/985406
#SPJ2
(a) Distinguish between hyperlink and homepage.
10 sentences about computer parts.
Which of the following factors is most likely to result in low shipping and handling costs? A higher than average hourly pay rate for material handlers A rare but high-in-demand packaging material A promotion for free shipping on orders over a predetermined order total All of the above
Answer: A higher than average hourly pay rate for material handlers
Explanation:
Shipping and handling cost describes costs related to the total cost of an ordered item which are included in the fees used to deliver the item to the buyer. Hence, the correct option is C
Shipping and handling cost usually depend on the size of the item, the buyer's location and fragility of the item purchased.
From the options given, handling and shipping fee may be reduced as a result of free promotional shipping on orders.
Handler and drivers who are paid above average will result in increased shipping fee and rare in-demand items won't come cheap either.
Hence, low shipping fee will most likely be as a result of promotion for free shipping on orders over a predetermined order total.
Learn more : https://brainly.com/question/20533392
To what extent do you agree with the assertion that “Collection development begins with community analysis”. (Give reasons to buttress your answer).
The assertion that collection development starts with community analysis is logically correct.
The collection development policy is vital for setting goals for the collection that mirror the missions of the library. It gives information to the stakeholders of the library about how the collection will be chosen, and who will make the decisions regarding the collection.
Collection development starts with community analysis. The collection plan should follow a logical process in order to be effective. The community should be taken into consideration before the plan is carried out. The more one knows about the community, the better it'll be to make the collection plan effective.
Read related link on:
https://brainly.com/question/21529943
Identify the following verb by number and person by checking on the appropriate boxes.
SHE WANTS!!
second person
singular
plural
same form for both singular and plural
third person
first person PLEASE HELP!!!!!! LAUNGUAGE ARTS
Answer:
Singular and third person
Explanation:
Second person: this answer is not correct as second person refers to pronouns such as “you, yourself” like in a recipe.
Singular: this is correct as a singular verb is when there is only one subject. You can also tell it’s a singular verb as the present tense ends with a “s”.
Plural: this is not plural because there is only one subject. Plus the present tense of the verb ends with an s so it’s not a plural verb. Plural verb’s present tense never ends with an s.
Third person: this is correct because the subject of the sentence is someone else. Third person pronouns include: “her, she, he, him, they, then” basically, third person is when you talk about someone else.
First person: this answer is not correct because first person refers to one’s self. So first person pronouns are: “I, me, myself”
4. Identify which type of algorithmic operation each one of the following steps belongs to: a. Get a value for x from the user. b. Test to determine if x is positive. If not, tell the user that he or she has made a mistake. c. Take the cube root of x. d. Do Steps 1.1, 1.2, and 1.3 x times
Answer:
a. input/output
b. if/else statement
c. while loop
Explanation:
I don't know, sort of...
A field name can be up to 64 characters long
Answer:
Explanation:
cool ..........................,...............................
To what extent do you agree with the assertion that “Collection development begins with community analysis”. (Give reasons to buttress your answer).
I completely agree that Collection development begins with community analysis; this is because the goal of collection development is to meet the information needs of everybody in a user community.
Collection development is a term used to describe the gathering and maintenance of library materials and resources such as textbooks, audiovisuals, and electronic materials for the community users to assess.
Collection development involves many processes, but it is better to begin with community analysis to know what type of resources, information, or materials is needed in that community.
It is from the community analysis and conclusion reached; other steps can then be followed sequentially.
Also, note that through community analysis, one can determine the present users of the library and their major interests.
Hence, in this case, it is concluded that community analysis is vital in the collection development in library and information management.
Learn more here: https://brainly.com/question/24837376
If you wanted to multiply two numbers, you would use the _____ key.
-
*
=
/
Where do you place the logical test argument in an IF function formula?
O before the IF function
O the first argument listed after IF
the second argument listed after IF
O the third argument listed after IF
Intro
Don
Answer:
the first argument listed after IF
yw
Why did the spelling and grammar checkers in Word miss the errors highlighted in yellow?
please help, im vv confused
Answer:
I do believe that it is a grammar mistake.
a. Get a value for x from the user.
b. Test to determine if x is positive. If not, tell the user that he or she has made a mistake.
c. Take the cube root of x.
d. Do Steps 1.1, 1.2, and 1.3 x times
Program (Python):-
[tex]\tt x=int(input("Enter\:your\:number:"))[/tex]
[tex]\tt if \:x<0:[/tex]
[tex]\tt \qquad print("You\:have\:made\: mistake")[/tex]
[tex]\tt else:[/tex]
[tex]\qquad\tt print("Well\:done")[/tex]
[tex]\tt cuberoot=x**1/3[/tex]
[tex]\tt print("Cube\:root=",cuberoot)[/tex]
[tex]\tt for\:i\:in\:range(x):[/tex]
[tex]\qquad\tt print(x)[/tex]
Sample output
Enter your number:-8
You have made mistake
Cuberoot=-2
-8
-8
-8
-8
-8
-8
-8
-8
HELP ASAPPPP PLSSSSS!!!!!! The purpose of capillary tubes is to:
permit oxygen and nutrients to be absorbed by cells
allow blood to complete a path between arteries and veins
reverse the flow of blood
provide a means for cell wastes to enter the blood stream
Answer:
Permit oxygen and nutrients to be absorbed by cells
Explanation:
Because ,the capillaries arw the smallest of the blood vessels they act as a bridge between the two main..vessels
ACTIVITY NI MATCHING TYPE Directions: Match Column A with Column B. Write the letter of the correct answer on the space provided before the number a. Trion your nails b. visits the dentist c. scrub your hands with soap and water d. wear deodorant taking a bath 18111411 hely wear suitable clothes at work g. avoidis open wounds while working with food h. Regularly out your hair. 1. Use a seperate towel or cloth wiping hands. . keep sanitizer. 10.
Answer:
Mark me a brainless plss i need that i am blink plss
Write a program in c++ to input a number print the sum of all the odd factors.
Answer:
#include <bits/stdc++.h>
using namespace std;
//calculate sum of odd factors
int sum(int n) {
int res = 1;
while (n % 2 == 0)
n = n/ 2;
for (int i = 3; i <= sqrt(n); i++)
{
int count = 0, total = 1 ;
int temp = 1;
while (n % i == 0) {
count++;
n = n / i;
temp *= i;
total += temp;
}
res = res*total;
}
if (n >= 2)
res *= (1 + n);
return res;
}
int main()
{
int n = 20;
cout<<"sum of odd factors is : ";
cout <<sum(n);
return 0;
}
Create a timeline of the evolution of computers.
Doesn’t have to be extra or super detailed
Answer:
The computer was born not for entertainment or email but out of a need to solve a serious number-crunching crisis. By 1880, the U.S. population had grown so large that it took more than seven years to tabulate the U.S. Census results.1937: J.V. Atanasoff, a professor of physics and mathematics at Iowa State University, attempts to build the first computer without gears, cams, belts or shafts.1943-1944: Two University of Pennsylvania professors, John Mauchly and J. Presper Eckert, build the Electronic Numerical Integrator and Calculator (ENIAC). Considered the grandfather of digital computers, it fills a 20-foot by 40-foot room and has 18,000 vacuum tubes.1985: Microsoft announces Windows, according to Encyclopedia Britannica. This was the company's response to Apple's GUI. Commodore unveils the Amiga 1000, which features advanced audio and video capabilities.2006: Apple introduces the MacBook Pro, its first Intel-based, dual-core mobile computer, as well as an Intel-based iMac. Nintendo's Wii game console hits the marke
Explanation:
What protocol is used to discover the hardware address of a node with a certain IP address?
Answer: ARP hope this helps
Complete the following sentences by either filling in the blank or writing out the rest of the sentence (when there is a … ):
The internet is made up of _________ networks that all connect together to make a ____________ network.
The job of a router on the internet is to…
Clients allow people to…
Servers store _____________________ and send those to _____________ over the internet.
The internet is physically connected across the world using _______________
Computers break up information, like photos and emails, into ________________
The ___________ protocol tells computers how to break up the information and orders it.
The ________________ protocol tells the packets where they are going and where they are coming from.
The packets get to their destination by…
When the packets get to their destination, the __________ protocol…
Computers get the _______________ of servers by asking the ______________
Computers use the _____________ protocol to display a webpage.
Answer
hundreds, massive, connect to the internet gigabytes, people, computers,
bytes, TCP/IP, TCP, internet, TCP, answers, questions, HTTP
Explanation:
am i the only one that finds so much bots on peoples pages lol
Write a method named removeDuplicates that accepts as a parameter a List of integers, and modifies it by removing any duplicates. Note that the elements of the list are not in any particular order, so the duplicates might not occur consecutively. You should retain the original relative order of the elements. Use a Set as auxiliary storage to help you solve this problem.
For example, if a list named list stores [4, 0, 2, 9, 4, 7, 2, 0, 0, 9, 6, 6], the call of removeDuplicates(list); should modify it to store [4, 0, 2, 9, 7, 6].
The method is an illustration of loops or iteration.
Loops are used to carry out repetitive operations.
The removeDuplicates method in Python is as follows, where comments are used to explain each line.
#This defines the method
def removeDuplicates(list):
#This initializes the output list
outputList = []
#This iterates through the list
for i in list:
#All elements not in the output list, are appended to the output list
if i not in outputList:
outputList.append(i)
#This returns the output list
return str(outputList)
At the end of the method, the new list contains no duplicates.
Read more about similar program at:
https://brainly.com/question/6692366
1.(154)10=(?)2
help me! I will give 25 points.
When you use a library in your code, how do you give attribution?
When you use a library in your code, you give attribution: by writing the source, title, author and license in your code.
Attribution can be defined as a process which typically involves the citation (reference) of an original source of information such as a library, quote, paraphrase or summary, especially by using the author's full name, source, and job title (position) as the case may be.
In software development, you give attribution when you use a library in your code by writing the following:
The source in your code.The title in your code.The author in your code.The license in your code.Read more: https://brainly.com/question/21172316
What is another name for a switch A.Number system B.Variable C.Logic Gate D.Boolean
Answer:
logic gate
Explanation:
took the test lol
where and when to implement such network.
i think it is a
and it is b , so haha