William plans to write a paper about computers. He wants to compare desktop and laptop computers. He is trying to decide how to use cubing to refine his topic. Which is an example of how cubing can be used to refine William’s topic? It can be used to write a thesis statement explaining the computer types being compared. It can be used to write a list of the levels and sublevels of the features of a laptop computer. It can be used to analyze and describe possible uses of each type of computer. It can be used to make a map showing all of the types of desktop computers.

Answers

Answer 1

Answer:

c) It can be used to analyze and describe possible uses of each type of computer.

Explanation:

I just did it on edge 100%

good luck

Answer 2

Answer:

c) It can be used to analyze and describe possible uses of each type of computer.

Explanation:

just did dis on edge hope dat helpssssssssss :)


Related Questions

A customer calls you and states that her laptop screen is very dim. In order to avoid going to the client's site, which of the following is the first action you should recommend to the customer to perform?
1. Use function keys
2. Set encryption
3. Restart the system
4. None of above

Answers

it depends on the brand of laptop,If it is standard use function key if not None of the above

You are working the 8:00 AM shift at the help desk. An irate user who fails to identify himself calls in claiming that his workstation is malfunctioning and that you need to fix it NOW. What is the first action you should take?

Answers

Answer:

Calmly ask him for his name and a more detailed explanation of the problem.

Explanation:

Since in the question,  it is mentioned that the anger use who fails to identify himself and claim that his workstation is malfunctioning and want to fix it now

Now the action which would be taken is to ask his name in a calmy manner and understand what the actually problem he is suffering by understanding it in a detailed way

Therefore according to the given case, the correct option is d.

Which of the following for-loop headers results in equivalent numbers of iterations: A. for (int q = 1; q <= 100; q++) B. for (int q = 100; q >= 0; q--) C. for (int q = 99; q > 0; q -= 9) D. for (int q = 990; q > 0; q -= 90) a. A and B. b. C and D. c. A and B have equivalent iterations and C and D have equivalent iterations. d. None of the loops have equivalent iterations.

Answers

Answer:

b

Explanation:

C and D have equivalent iterations

C:       D:

99    990

90      900

81      810

72      720

63      630

54      540

45      450

36      360

27      270

18      180

9       90

Importance of taking correct body measurement....

Answers

Taking correct body measurements is of key importance especially to models and future models. So that they remember about the leftover weight in their body from thanksgiving , now when they take correct body measurements , they are aware and will counter such things to be better.

Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x modulo 2 (remainder is either 0 or 1) Assign x with x divided by 2

Answers

Answer:

Following are the code to this question:

def binarynumber(num):#defining a method binarynumber that accepts a parameter num

   x=""#defining a string variable x

   if (num!=0):#defining if condition to check number not equal to 0

       while (num>=1):#defining a loop that check value is grater then equal to one

           if (num %2==0):#defining if condition to check num is even

               x=x+"0" #add string value 0 in num variable

               num=num/2 #divide the value by 2

           else:#defining else block

               x=x+"1"#add string value 1 in num variable

               num=(num-1)/2#first subtract 1 into num variable then divide the value by 2

   else:

       x="0"#assign string value 0 in num variable  

   return "".join(reversed(x))#return value

num = int (input ("Enter any number: "))#defining num variable that input the integer value

print (binarynumber(num))#using print method to call method binarynumber with passing num parameter

Output:

Enter any number: 12

1100

Explanation:

In the above python code a method "binarynumber" is declared, in which the "num" variable passes as the parameter inside the method a string variable "x" is declared that stores all converted values. Inside the method and if the block is declared that checks number value is not equal to 0 if this condition is false then it will add string value and reverse its value. Or if the condition is true it defines a while loop that calculates the given number binary digits and returns its value. At the last step, the num variable is declared that inputs the integer value from the user end and calls the method by using the print method.    

B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
plese help me​

Answers

Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.

Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.

Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.

One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.

From that day, it was my daily life..on off..on off..on off..

Suppose you have the following variables defined: a = 100 b = 50 Write a Python if/else statement to assign the smaller of a and b to the variable m.

Answers

Answer:

a, b = 100, 50

if a < b:

m = a

else:

m = b

The program which assigns the smaller of the values in variable a and b using an if/else statement ls :

a = 100

b = 50

#assign the 100 and 50 to the variables a and b respectively

if a > b :

# the if statement checks if the variable a is greater the value on variable b

m = a

# if true assign the value of a to the variable m

else :

# if otherwise, then b would be greater

m = b

#assign the value of b to m

#the sample run of the program is attached

print(m)

Learn more :https://brainly.com/question/15727806

A company has a network printer that is utilzed by several departments. Although the printer shows online and other departments can access the printer, the accounting group is unable to print to this network printer. Which of the following would the technician use to resolve the problem?
a. The printer needs a maintenance kit repalced.
b. The TCP/IP print spooler service need to be restarted.
c. The security settings for the print spooler need to be modified to include the department.
d. Replace the network cable on the printer

Answers

Answer: c. The security settings for the print spooler need to be modified to include the department.

Explanation:

The print spooler makes Windows computer enable to interact with the printer, and to commands the printer for print jobs .

If all the other departments can access the printer,  but not the accounting group, then the technician should check the security settings for the print spooler and modify it accordingly to include the accounting group  .

Hence, the correct answer is c. The security settings for the print spooler need to be modified to include the department.

Assuming that a valid price should be between 30 and 50, what does the following code snippet do? final int MIN_PRICE = 30; final int MAX_PRICE = 50; int price = 0; Scanner in = new Scanner(System.in); System.out.print("Please enter the price: "); price = in.nextInt(); if (price < MIN_PRICE) { System.out.println("Error: The price is too low."); } else if (price > MAX_PRICE) { System.out.println("Error: The price is too high."); } else { System.out.println("The price entered is in the valid price range."); } This code snippet ensures that the price value is between 30 and 50. This code snippet only ensures that the price value is greater than 30. This code snippet only ensures that the price value is less than 50. This code snippet ensures that the price value is either less than 30 or greater than 50.

Answers

Answer:

This code snippet ensures that the price value is between 30 and 50.

Explanation:

If the price is not between 30 and 50 then the output will be "Error:  ...."

A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The user insists they specifically gave this third party Allow rights for Read and Write access. Which of the following could explain the problem at hand?
A. The parent folder has explicit Allow rights set for this user.
B. The parent folder has explicit Deny rights set for this user.
C. The user forgot to share the parent folder and only shared the specific file.
D. The parent folder likely has the "archive" attribute enabled.

Answers

Answer:

i think it's going to be c

Explanation:

3. Write the qbasic program for following:
[10]
a) To find square of 3.
b) To print and display square and cube of 4.
c) To print and display simple interest where principle is 4000 rs, time is 2 years and
rate is 5%.
d) To find sum, subtract, product and division of 8 and 4
e) To find and print sum and product of two input numbers.


it's a really important assignment and I will need all the answer. I will follow, give 5 star and a heart for the first person who gives the answer. please be quick. it is important​

Answers

Answer:

Hi there!!!

I hope it helps you...

Refer to the exhibit. A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses command line utilities to verify the problem and to begin the troubleshooting process. Which two things can be determined about the problem? (Choose two.)
A. The web server at 192.168.0.10 is reachable from the source host.
B. The default gateway between the source host and the server at 192.168.0.10 is down.
C. There is a problem with the web server software on web-s1.cisco.com.
D. A router is down between the source host and the server web-s1.cisco.com.
E. DNS cannot resolve the IP address for the server web-s1.cisco.com.

Answers

......Explanation:

ascsmlmcm

Based on the information, it is clear that the web server at the IP address is reachable, yet there may be a DNS goal issue for its space name. Option A and E is the correct answer

How is the web server part of the problem?

The problem can be understood in two ways based on the information provided:

A. The web server at 192.168.0.10 is reachable from the source.

This is not entirely set in stone by the fruitful ping order reaction to the IP address of the web server. Assuming that the web server was inaccessible, the ping would fall flat.

E. DNS cannot resolve the IP address for the server web-s1.cisco.com.

This may be induced by the truth that the specialist utilized the IP address (192.168.0.10) rather than the space title (web-s1.cisco.com) to test the network. On the off chance that DNS was working appropriately, the expert would have utilized the space name all things being equal.

As a result, we are able to conclude from the exhibit that the web server at the specified IP address can be reached; however, there may be a problem with DNS resolution for the server's domain name.

Learn more about web servers here:

https://brainly.com/question/29490350

#SPJ2

Write a method, getFirstLine, that is passed a String argument and that returns the first line. (Recall that lines are terminated with the "\n" character.) Assume that the argument contains at least one complete, newline-terminated line.
My Solution:
public String getFirstLine(String a)
{
String[] myLines = a.split("\n");
return(myLines[0]);
}

Answers

Answer:  The answer to this question can be given as:

Method definition :

String getSecondLine (String aString) //define function getSecondLine()

{

return aString.substring(aString.indexOf("\n") + 1, aString.indexOf("\n") + 1 + aString.substring(aString.indexOf("\n") + 1, aString.length()).indexOf("\n"));

//return value.

Explanation:

Administrator access initiative brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.
a) true
b) false

Answers

Answer:

False.

Explanation:

Web Accessibility Initiative (WAI) brings together people from industry, disability organizations, government, and research labs from around the world to develop guidelines and resources to help make the Web accessible to people with disabilities including auditory, cognitive, neurological, physical, speech, and visual disabilities.

It is one of the features of the World Wide Web Consortium (W3C) develiped in 1997 and is aimed at developing standards and support materials to assist in understanding and implementing accessibility for users with disabilities.

What is the outcome of the following code snippet? boolean val1 = true; boolean val2 = false; while (val1) { if (val1) { System.out.println("Hello"); } val1 = val2; } No output will be displayed because of a compilation error. Hello will be displayed only once. Hello will be displayed infinite times. No output will be displayed even after successful compilation of the code snippet.

Answers

Answer:

Hello will be displayed only once.

Explanation:

Look at the picture*

Chapter 21 discusses four aspects of the speaking situation you should take into account when planning the graphics you'll use in an oral presentation including the length of the presentation, the size and layout of the room, and the available equipment. What is the last aspect?

Answers

Answer:

The answer is "audience aptitude and experience "

Explanation:

The presentation is the ability to provide a variety of audiences with successful and stimulating interactions. The main objective of an oral presentation is to talk formally to a live audience about a particular subject. You have to write an oral speech that engages the audience and fulfills your goals.

In this type of presentation, the Listener-centric concept is effective as the productivity of a speaker is enhanced by creating and presenting the speech throughout the proper manner.

A computer program is said to learn from experience E with respect to some task T and some performance measure P if its performance on T, as measured by P, improves with experience E. Suppose we feed a learning algorithm a lot of historical weather data, and have it learn to predict weather. In this setting, what is T

Answers

Answer:

The weather prediction task

Explanation:

Note: Example: playing checkers.

E = the experience of playing many games of checkers

T = the task of playing checkers.

P = the probability that the program will win the next game.

MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.

Answers

Answer:

The personal preferences that can be saved are

A. Customize your bookmark bar

C Change your home page

D Enable safe browsing in your privacy setting

Explanation:

The Bookmark manager can be used for personal customization of the bookmarks in chrome

The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks

The personally preferred homepage can be selected under appearance category in the settings menu

The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.

A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would BEST meet the CIO's requirement?

Answers

Answer:

"Mesh topology" is the correct answer.

Explanation:

A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.

If you have a 3D printer please show me a vid of you making something because I'm interested in getting one. Ty! Also can someone show me how to put more points in a question that I ask on Brainly?

Answers

Explanation:

Too add more points on your brainly question(phone), type your question

Then, see on your top left, you can see the points. It will show 10,which means you have to lose 10 points which is the minimum points for one question. If you are generous to give more points, click on it the you can scroll till the maximum point which is 100..but each points you give will divide 2.

For example, you just loose 10 points for your question but I only got 5 points

Hope you understand this

I'm not sure with laptop

HAVE A GOOD DAY!

Which method would be the BEST to protect security information and event management (SIEM) log data at rest from tampering by authorized users?A. Access control lists (ACLs) on log data drivesB. Deployment of write once read many (WORM) drivesC. Disk encryption using hardware security modules (HSM) on log data drivesD. Implementing the principle of least privilege on log data drives

Answers

Answer:

Option B (Deployment of write once read many (WORM) drives) is the appropriate one.

Explanation:

SIEM application goods/services consolidate safety information management (SIM) with security event management (SEM) throughout the area of device protection. We include an overview including its known vulnerabilities created by users and network equipment in actual environments.No quantity of administrative intervention will alter the substance on something like a WORM disc, even by physical disc disruption or failure. That would be the better-suggested choice.

can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?

Answers

Answer:

Yes

Explanation:

0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.

what are the different categories of a computer

Answers

Answer:Computer is a machine that can be program to manipulate the symbols.

Explanation:There are five different categories of a computer.

(1)super computer (2) mainframe (3) personal computer (4) workstation

(5) minicomputer

(1)super computer: super computer is the term fastest computer available current time.super computers are very expensive and specialized computer.

(2)mainframe : mainframe computer is perform to the execute the program the currently.

(3) personal computer: The most popular use for personal computer playing games and surfing internet.

(4)workstation: This type of computer used for the engineer applications desktop publishing , software development.

(5)minicomputer: The general a minicomputer is multiprocessing system it is a midsize computer.

Which of the following statements is false? a. As of Java SE 8, any interface containing only one method is known as a functional interface. b. There are many functional interfaces throughout the Java APIs. c. Functional interfaces are used extensively with Java SE 8â s new lambda capabilities. d. Anonymous methods provide a shorthand notation for creating lambdas.

Answers

Answer:

d. Anonymous methods provide a shorthand notation for creating lambdas.

Explanation:

Java SE 8, is Standard Edition of Java. It is a computing platform for deployment of portable code for servers. The statement that is not correct is anonymous method provide shorthand notation. Lambda expression are added in Java 8, which enables to treat functionality as method argument code or data. Lambda expression can be passed around as it is an object executed on demand.

Assuming that a user enters 68 as the score, what is the output of the following code snippet? int score = 68; if (score < 50) { System.out.println("F"); } else if (score >= 50 || score < 55) { System.out.println("D"); } else if (score >= 55 || score < 65) { System.out.println("C"); } else if (score >= 65 || score < 75) { System.out.println("B"); } else if (score >= 75 || score < 80) { System.out.println("B+"); } else { System.out.println("A"); } D C B A

Answers

Answer:

D

Explanation:

Using if in this way will validate one by one, and finding a true value will not validate the rest of "else if"

score = 68

if (score < 50) --> print "F"

68 < 50 --> false

else if (score >= 50 OR score < 55)  --> print "D"

68 > = 50  TRUE .... (The OR operator displays a record if any of the conditions separated by OR is TRUE)

As this condition is true the system will not validate the other conditions

Lee finishes entering all the data. Next, he wants to format the header row so it is easier to read and stands out from the rest of the table. What should Lee do to accomplish this task?

Answers

Answer:

A: Add shading to the top row

B: Change the style of the table

Explanation:

Just got the question myself and got the answer from it

Answer:

A B

Explanation:

i just did the assignment└|∵|┐♪

A _____ cloud allows an organization to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to the outside world.

Answers

Answer:

Hybrid

Explanation:

Hybrid cloud is a solution that combines a private cloud with one or more public cloud services, with proprietary software enabling communication between each distinct service.

Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers.
​Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
A. ​src
B. ​loop
C. ​controls
D. ​preload

Answers

Answer:

I think it's preload :P

Explanation:

But just be sure with some sources ok ! :♡

Consider a text editor that saves a file whenever you click a save button. Suppose that when you press the button, the editor simply (1) animates the button "down" event (e.g., by coloring the button grey), (2) uses the write() system call to write your text to your file, and then (3) animates the button "up" event (e.g., by coloring the button white). What bad thing could happen if a user edits a file, saves it, and then turns off her machine by flipping the power switch (rather than shutting the machine down cleanly)

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The write() method guarantees you to updates the memory of both the kernel, and may not ensure which updates were flushed through stable storage. Unless the client instead switches on either the monitor but views the file, it displays the file, to combines from older and newer versions will be shown. The very first two cases will be deemed "bad" because the user probably can not expect them after completing the save.

What number system do people in America use?

Answers

Answer:

Base-10 (decimal)

Explanation:

America uses the imperial system.

The majority of the rest of the world uses the metric system (base 10).
Other Questions
How many solutions does this system have? 6 x + 3 y = negative 12. y = negative 2 x + 4. one two an infinite number no solution what is the climax of the book the storm runner by jc cervantes Jack challenged Jill to a race around a curve of a track. Jack took lane 8 with Jill at lane 1. If the radius of lane 1 is half of lane 8, what is the distance in metres Jack has to run if Jill ran a distance of 50m? if p(x) = x+ 7/ x-1 and q (x) = x^2 + x - 2, what is the product of p(3) and q(2)? a. 50 b. 45 c. 40 d. 20 e. 6 Which equation represents an exponential function with an intitial value of 500? f(x) = 100(5)^x, f(x) = 100(x)^5, f(x) = 500(2)^x, f(x) = 500(x)^2 Write an expression for the volume and simplify your answer. 3x x+1 x+4 I23. Explain the Spanish mission Consider points a, b, and c in the graph. Which point is the global maximum? Question 6 options: A) b B) c C) None of these D) Application Writing: Suppose, you are a student of 2nd semester, BBA. Your batch want to arrange an initiation ceremony for the freshers of the department. Now, write an application to the proper authority seeking permission to arrange this ceremony by justifying your stance. help [lz A constant force of 85 N accelerates towards a 10 kg box from a speed of 3.0 m/s to a speed of 7.0 m/s as it goes 14 m along a horizontal floor. What is the coefficient of friction between the box and the floor? Tropical plant fossils have been found in cold Arctic islands where they cannot survive in the present-day climate of this area. According to Wegener's theory, how were these ancient tropical plants able to survive in Arctic islands?O Plants were more adaptable in the past.O The poles of Earth were warmer in the past.O Arctic islands were closer to the equator in the past.O Land movements warmed the landmasses in the past. Use the words that you know to write about a fictitious friend. You must use at least eight words dealing with parts of the body. Write about your friend's personality, likes, dislikes, hobbies, family, or anything that you know how to say about it, him or her. Two hundred undergraduate students were randomly selected from a university that has 47,000 students in total. Systolic blood pressure was tested on the 200 students. The sample mean is 118.0 mmHg and the sample standard deviation is 11.0 mmHg. Please construct a 95% confidence interval for the population mean of students' systolic blood pressure. Which one of the following results is the closest to your answer? (Hint: use 1.96 as the critical z-value) a. [110.5, 125.5] b. [112.5, 123.5] c. [114.5, 121.5] d. [116.5, 119.5] The nth term of a geometric sequence is a sub n =a sub 1 times r ^n-1 , where a sub 1 is the first term and r is the common ratio. Identify a sub 1 and r for each geometric sequence. n investor has $100,000 invested in an account that earns 5% annually. The investor wishes to withdraw $12,000 per year. If the investor withdraws $12,000 annually, the account will be fully depleted in: PLEASE HELP: Which is a compound event? Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is done today. * 5 points technology and mathematics principles the engineering design process technical know-how positive and negative effects of using technology Please help I really need to get it right Assignment Content Potential risk factors are found in every project. Although individual projects have different risks, there are several common risk factors. Create either a list or chart of 5 common potential risks. In 1 to 2 sentences, briefly explain why each of these risks are so common. How are they measured? Why are these important to consider when evaluating an organizations strategic plan? Submit your list or chart. A steady stream of water flows into a partially-filled rectangular tank. After 6 minutes, there are 87 gallons of water in the tank. After 21 minutes, there are 222 gallons. Write an equation to represent the volume of water in the tank y after x minutes. How much water was in the tank to begin?