Answer:
The keyboard was invented for the alphabet and numbers so people can talk to others and work on essays, and have a way to communicate to human beings and for stuff like i'm doing right now, writing paragraphs for stuff like this and for school, really the keyboard was invented for anything, you can use it for anything in the whole world.
Explanation:
Hope this helps!!
How is opera diffrerent from blues,gospel,and country music?
Answer: Opera has its roots in Europe; the other styles are American
Explanation:
the basis of modern technology is traditional technology
Answer:
A customized innovation is of specialized advances where some unique things are added to extend it. The present day advances have been based on the fundamental structures purposes and working of the traditional technologies.
Hence, it can be concluded that “The basis of modern technology is traditional technology”
assembly language uses _____ coder for programming.
Answer:
Assembly language uses alphabetic codes in place of binary numbers used in machine language. assembly language code is converted into executable machine code by a utility program referred as assembler.
> var direction = []; directions.push("walk to corner");//1 directions.push("turn right");//2 directions.push("walk one block");//3 directions.push("turn left");//4 directions.push("walk to gray house");//5 directions.push("go down the strairs");//6 directions.push("knock on the pink door");//7 console.log(directions); "knock on the pink (7) ["walk to corner", "turn right", "walk one block", "turn left", "walk to the gray house", "go down the astairs" door",]
is dis code correct
Answer:
no it's not correct.........
Typically you will not find biometric devices in _________ security buildings. Low High Minimal Medium
Answer:
Low
Explanation:
Biometrics security systems are hardware scanners that are useful for capturing the biometric of individuals as a means of verifying identity. These scans would be matched against the saved database and in turn access would be approved or denied to the system. In other words, biometric security gives the human body the “key” to unlock your access into buildings.
You will not find such devices in low security buildings.
how do i create a business process flow chart?
Answer:
Determine the main components of the process. ...
Order the activities. ...
Choose the correct symbols for each activity. ...
Make the connection between the activities. ...
Indicate the beginning and end of the process. ...
Review your business process diagram.
Explanation:
HELP
Question 1 (1 point)
GIF, JPG, and TIFF are raster-based.
O True
O False
It is true. GIF and JPG are mostly rasted (can be a vector), and TIIFF is rasted.
Computer applications can help us to stay organized, but they can also add a lot of complexity! What are some ways you use applications to help streamline your life? What else would you like to use to further improve your organization?
The ways that a person can use applications to help streamline your life are:
It helps a person to delegate one task.It helps to De-clutter a person's workspace.It helps to make a system for a regular task. It helps to break as well as cut down one's communicationIt helps to plan out your week.What else would you like to use to further improve your organization?Application's that can give constructive feedback. ...Applications that helps to Organize and optimize tasks. .What is the meaning of computer application?Computer Application is known to be a term that connote a kind of an identifiable computer software process that is often used to make as well as gets back communications or transactions on a person's behalf or on behalf of an organization which it stands for.
Therefore, The ways that a person can use applications to help streamline your life are:
It helps a person to delegate one task.It helps to De-clutter a person's workspace.It helps to make a system for a regular task. It helps to break as well as cut down one's communicationIt helps to plan out your week.Learn more about Computer applications from
https://brainly.com/question/24264599
#SPJ1
The term structure, as it relates to programming, refers to the decisions you make to design your program to best meet its objective. Coral provides features to create clean, efficient code. How can the basic if/elseif/else control statements help meet structural design objectives in your code?
Answer:
Explanation:
if/elseif/else control statements help accomplish efficient code since it provides a condition. The program analyzes the code and determines if certain criteria are met, if so then it continues down a certain pre-defined path which would be the most efficient path towards the main program objective. If these criteria are not met then the code would follow the next most efficient path. This is all controlled through if/elseif/else statements. They ultimately provide various options for reaching the final objective in an order of most efficient to least efficient.
What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?
* (an asterisk)
# (a pound sign)
$ (a dollar sign)
_ (an underscore)
Answer:
_ (an underscore)
Explanation:
The underscore character.
__init_ and __str__ have double underscore characters at the beginning and end of the function name.
Correct answer edge 2020
Answer:
The answer to your question is _ (an underscore).
I hope this helps you out and I hope that you have a wonderful day.<3<3<3
Explanation:
Question # 1
Multiple Choice
What will be the output of the following program?
def average(a, b):
total = a + b
return total / 2
ave = average(7,11)
print("Total", total)
print ("Average", ave)
A. an error statement since total's scope is limited to the average function.
B. Total 18
Average 9
C. Total18
Average9
D. an error statement since average is a keyword.
Answer:
an error statement since total's scope is limited to the average function.
Explanation:
The scope of total is the function average. Code outside of the function does not have access to its value.
Correct answer edge 2020
Answer:
an error statement since total's scope is limited to the average function.
Explanation:
The scope of total is the function average. Code outside of the function does not have access to its value.
Correct answer edge 2020
What is machine learning?
What is included in a linked list node?
I a reference to the next node
II an array reference
III a data element
Answer: I a reference to the next node
III a data element
Explanation:
A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.
In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.
Therefore, based on the explanation above, the correct option will be:
I. a reference to the next node
III a data element
Unitary method question 1) If the cost of 32 copies is Rs 960, how much more cost is of 3 dozen copies ?
Answer:
the cost of 3 dozen copies is Rs 1080.
Explanation:
32 copies =Rs 960
1 copy =Rs 960÷32
= Rs 30
3 dozen = 3 × 12. =36
36 copies = 36 × 30
= Rs 1080
Give five (5) words that describes about computer.
Explanation:
C=Commonly
O=Operated
M=Machine
P=Particularly
U=Used for
T=Training
E=Education
R=Research
hope it helps you
Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?
Answer:
Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.
________________ is one example of a career that is available within the web and digital communications path.
Question 13 options:
Multimedia artists and animators
Engineer
Police Officer
Programmer
Answer:
multimedia artists and animators
this is computer programming and it confuses me very much
Answer:
Using a loop or using the power function from a math library.
Explanation:
Really the question needs a bit more context. But if you want to calculate [tex]a^{b}[/tex]
and b is a whole number, you could create a loop with b steps and keep multiplying by a.
Alternatively, you can use a power function such as pow(a,b) from math.h in the C programming language.
PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT
Answer:
B
Explanation:
I think that is the right answer
8.3.9 Text to Binary Python
Using the knowledge in computational language in python it is possible to write a code that write the binary code
Writting the code:
#function that will convert the text to binary
def text_to_binary(text):
#variable to store the converted binary value
binary_text = ""
#iterate for each character in the text
for i in text:
#get the ASCII value of that character
ascii = ord(i)
#call the function to get the value of the
#current ascii number and append it to the
#binary_text
binary_text += decimal_to_binary(ascii)
#return the final converted binary value
return binary_text
def decimal_to_binary(decimal_value):
binary_base = 2
num_bits_desired = 8
binary_value = str(bin(decimal_value))[2:]
while len(binary_value) < num_bits_desired:
binary_value = "0" + binary_value
return binary_value
text = input("Input the string you would like to encode: ")
binary = text_to_binary(text)
print(binary)
See more about python at brainly.com/question/18502436
#SPJ1
What is the missing line of code?
class vehicle:
self.model = strModel
self.color = strColor
def
_str_(self):
return self.model +
+ self.color
Answer:
def__init__(self,strModel,strColor):
Which steps can you take to remove all the data you've just typed from a cell?
Click the cell, then press Delete.
Click Undo on the Quick Access Toolbar.
Click Cut on the Clipboard group.
Press Ctrl+Z.
Press Ctrl+Shift.
Explanation:
Ctrl+Z
Click and press Delete
Click Undo
project members are called change agents. why?
A project members are called change agents because they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.
What does being a change agent mean?In regards to business, a change agent is known to be called any body be it a man or a woman that helps to promotes as well as supports a new method of doing things inside of the company, even if it is the use of a new method, the taking in of a new management structure or the changing of an old business model to those of a new one.
Therefore, based on the above, A project members are called change agents because they are people who have the skill as well as the capability and power to bring about, influence, facilitate, as well as coordinate the change effort.
Learn more about project members from
https://brainly.com/question/24248709
#SPJ1
Imagine that you are designing a smishing scam that involves sending text to people to entice them to go to a website and provide personal information that
you can use to access their checking account.
Open a new Microsoft® Word document and craft a text message that would be difficult for people to ignore.
Design a simple web page that would look legitimate to people who bank at your bank and that would capture their checking account number and PIN.
Answer:
Explanation:
i attached picture down check it below
select the correct answer
Environment varies firm to firm
of
Select one:
O True
tion
False
Answer:
true
...................
Janitor and Cashier classes have a print function that is similar. How can we refactor this code to reduce repetition?
A sample code to show how to refactor a code to reduce repetition if two classes have a print function that is similar:
The Codepublic abstract class DeviceMessageBase
{
public void Connect()
{
// do connect things
}
public void WaitMessage()
{
// do wait message things
}
public void ParseMessage()
{
// do parse message things
}
public abstract void ProcessMessage();
}
public class DeviceMessageNavigator : DeviceMessageBase
{
public override void ProcessMessage()
{
//**//NAVIGATE MESSAGE(Pass it to somewhere else)**
}
}
public class DeviceMessagePrinter : DeviceMessageBase
{
public override void ProcessMessage()
{
//**//PRINT MESSAGE**
}
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Imani needs to copy text from one document into another document. She needs the pasted text to retain its original appearance. When she pastes the text, she should use which of the following settings?
Keep Text Only
Use Destination Theme
Merge Formatting
Keep Source Formatting
Answer:
Keep Text Only
Explanation:
Because why would it be any of the other ones so it would be that
Imani must transfer text from one paper to another. She ought to preserve the formatting from the original content when she pastes it. Hence, option D is correct.
What is a Document?A file produced by a software program is a computer document. Originally used to describe only word processing documents, the term "document" is now used to describe all saved files. Text, photos, music, video, and other sorts of data can all be found in documents.
An icon and a filename are used to identify documents. The filename gives the file a specific name, whereas the icon depicts the file type visually. The majority of filenames for documents also contain a file extension, which indicates the file type of the document. For instance, a Photoshop document might have a.PSD file extension, whereas a Microsoft Word document would have a.DOCX file extension.
To get more information about Document :
https://brainly.com/question/2901657
#SPJ6
If the three operations were combined, O(logN) + O(N) * O(logN) + 1, the overall algorithm cost would be:________
A. O(N)
B. O(logN)
C. O(logN)+O(N)
D. O(NlogN)
Answer:
D. O(NlogN)
Explanation:
The computation of the overall algorithm cost is as follows:
Given that
O(logN) + O(N) × O(logN) + 1
In the case of complexity we considered the high order that dominates the other terms
Thus, that term would be
O(N) × O(logN)
It could be rewrite as
O(NlogN)
Hence, the correct option is D.
All the other options are wrong
Answer:
D. O(NlogN)
Explanation:
the overall algorithm cost would be: O(NlogN).
the acronym PC stands of
Answer:
personal computer
Explanation:
It stands for personal computer