Answer:
[tex]z= \frac{1}{3}[/tex]
Explanation:
Given
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Required
Solve
[tex]\frac{z}{7} = \frac{1}{21}[/tex]
Multiply both sides by 7
[tex]7 * \frac{z}{7} = \frac{1}{21} * 7[/tex]
[tex]z= \frac{1}{21} * 7[/tex]
Rewrite as:
[tex]z= \frac{1 * 7}{21}[/tex]
[tex]z= \frac{7}{21}[/tex]
Simplify fraction
[tex]z= \frac{1}{3}[/tex]
BE CAREFUL OF SCAM LINKS HERE
check attached bcuz brainly freak block this
also i love u grammarly
Answer:
I know what the scam links look like and to be careful. Thanks for warning us though. Have a awesome day!
Explanation:
Answer:
have u watched euphoria
Explanation:
lol
what is modern? explain
Answer:
modern means present like the moment like for example the iphone 12 is modern because it was made last year or this year i forgot but pretty much it means in the present
Explanation:
bakit mahalaga ang pagtutugma ng iyong mga personal na salik sa minimithing karera
Answer:
Hi not able to understand your language
Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False
Sam is a Windows system administrator responsible for setting up client workstations for different departments. After installing the operating system, Sam manually disables certain programs that aren't needed by that department. Recently, Sam learned a few workstations had been compromised. The security analyst suggests that the disabled applications may have been the target. Going forward, what should Sam change in his process
Answer:
not disable any programs after installing a new operating system
Explanation:
Sam should simply not disable any programs after installing a new operating system. If the system is working as intended then he should leave it be, as the saying says "Don't fix what isn't broken". When a new operating system is installed, the entire system is usually wiped, meaning that the only programs installed have been installed as defaults by the operating system. Usually, this is for a reason and acts as security measures for the user, the system, and all of the data. Most of these programs interact with each other and work off of each other's data. Removing them from the system can prevent other very important functions of the operating system from performing their duties, which in term can compromise the entire security of the system. Therefore, the best thing to do would be to not remove these default programs.
JAVA
Write a method that takes an ArrayList of Strings, and an int numRepeats and returns a new ArrayList with the original ArrayList repeated numRepeats times.
For example if we had an ArrayList list with the values ["a", "b", "c"]:
repeatArrayList(list, 3)
Should return a new ArrayList with the elements:
["a", "b", "c", "a", "b", "c", "a", "b", "c"]
public ArrayList repeatArrayList(ArrayList list, int numRepeats)
{
}
Answer:
Explanation:
The following code is written in Java. It creates a function that takes in an ArrayList and an int parameter. Then it loops through the array and adds each element into a new array called newList but adds them the number of times that the numRepeats argument states. Output can be seen in the attached image below.
import java.util.ArrayList;
class Brainly{
public static void main(String[] args) {
ArrayList list = new ArrayList();
list.add('a');
list.add('b');
list.add('c');
ArrayList newList = repeatArrayList(list, 3);
System.out.println(newList);
}
public static ArrayList repeatArrayList(ArrayList list, int numRepeats) {
ArrayList newList = new ArrayList();
for (int x = 0; x < numRepeats; x++) {
for (int i = 0; i < list.size(); i++) {
newList.add(list.get(i));
}
}
return newList;
}
}
Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.
Answer:
They are the same layer, only they are viewed through different conventions.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;
I. Application layer.
II. Transport layer.
III. Internet layer.
IV. Network layer.
This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.
Answer:
c
Explanation:
When did computer networking go beyond the walls of the firm?
Answer:
All kinds of computing devices such as tablets, PCs, or laptops feature a brain-like unit called the central processing unit or CPU. Your computer's CPU calculates and interprets instructions while you're surfing the web, creating documents, playing games, or running software programs.
Explanation:
what is the answer???
Answer:
I think it should be C
Explanation:
A group of two or more computers that are link together.
The students start the school year with the same number of crayons and markers in their supply boxes. They count the number of these supplies remaining at the end of the school year. Here is a bar chart showing the data the students collected. Predict the three colors of crayons and markers the class will use the most next year.
Answer:
Hello :P AAAAAAAAAAAAAAAAAAAAAAAAA
5.7 AP-Style MC Practice edhessive
In Fantasy Football, participants compete against one another by choosing certain players from different NFL teams that they think will do the best on any particular week. Top Fantasy Football players spend hours every day looking at huge databases of statistics related to the players and the teams often using spreadsheets and software tools to gain new insights and choose the best players. This process could be considered an example of which of the following?
(DATA MINING)
Students are using data collected from a non-profit organization to try to convince the school board that their school should be in session year-round with several week-long breaks as opposed to the usual 9 months on and 3 months off. Information that was collected by this organization was as follows.
The location of the school (city and country)
The number of students at the school
Whether it was year-round or had the normal 3-month summer break
Scores on standardized tests (AP, SAT, ACT, etc)
The student handbook of rules and regulations
Results from a survey from teachers and students about happiness level and motivation level
They decided to make an infographic in order to try to easily display the data they had analyzed. Which of the following would be the best information to put on their infographic to try to convince the school board to change the schedule?
Select two answers.
(Association rules showing links between motivation and happiness levels and the type of schooling students were receiving.)
(A regression analysis of standardized tests scores comparing the two different types of schooling.)
Which of the following terms describes the conversion of data, formatted for human use, to a format that can be more easily used by automated computer processes?
(Screen Scraping
Answer:
1. Data Mining
2. A regression analysis of standardized tests scores comparing the two different types of schooling. || Association rules showing links between motivation and happiness levels and the type of schooling students were receiving.
3. Screen Scraping
Explanation:
1. The data analyze big data sets to gain insight, which a person can't do, so it is data mining.
2. A regression analysis shows the mathematical relationship between two variables. Association rule mining finds features of data points which determine the results of other features.
3. Screen scraping generally refers to process recordings.
True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.
Answer:
true
Explanation:
true true true true true
essence of radio program
Answer:
Radio has the ability to reach across borders and can become a valuable source of information where reliable news is scarce. Radio has proved its worth in times of emergency such as when access to the mobile network is down as a result of an overload, or phone lines are cut.
Explanation:
Match the roles to the task they perform.
gather requirements
create software framework
identify errors in the software
develop program code for software
Role
software architects
business analysts
programmers
testers
Software Architects: “develop program code for software”
Business Analysts: “gather requirements”
Programmers: “create software framework”
Testers: “identify errors in the software”
plzzz help i need this today :(
Answer:
C
Explanation:
What is the difference between a patent and a copyright?
A copyright protects inventions, a patent protects intellectual property.
B copyright protects intellectual property; a patent protects inventions.
C Copyrights are for music, and patents are for books.
D Patents are for books, and copyrights are for music.
Answer:b
Explanation:
The difference between a patent and a copyright is,
B) Copyright protects intellectual property; a patent protects inventions.
Given that,
To find the difference between a patent and a copyright.
We know that,
Copyrights primarily safeguard original works of authorship, such as literary, artistic, musical, or dramatic creations.
On the other hand, patents are granted to inventors to protect new and useful processes, machines, compositions of matter, or any new and inventive improvement thereof.
So, copyrights are more about creative expressions, like music and books, while patents are focused on protecting unique and innovative inventions.
Option B is true.
To learn more about copyright visit:
https://brainly.com/question/357686
#SPJ4
Write a program that asks the user for the name of a file. The program should display the contents of the file with each line preceded with a line number followed by a colon. The line numbering should start at 1. (You can create a file and populate it with some data, then run your program to open that file and display the contents line by line with the number of the line preceding the line data)
Answer:
Explanation:
The following program is written in Python. It asks the user for the file name (which needs to be in the same directory as the program) and reads the file. It then splits it by lines and saves it into an array. Then it loops through the array, printing each line with its corresponding line number.
file_name = input("File Name: ")
f = open(file_name, 'r')
lines = f.read().split('\n')
for line in lines:
print(str(lines.index(line) + 1) + ': ' + line)
Computer programmers must be fluent in every programming language. (5 points)
O True
O False
Answer:
False, its true that they need to know some programming languages but they do not need to be fluent in all of them.
PLEASE ANSWER ALL QUESTIONS CORRECTLY FOR 50 POINTS AND A BRAINLIEST!!!! IT ALSO INCLUDES ENGLISH, PLEASE KEEP IN MIND THIS IS ALSO IMPORTANT JUST AS THE OTHERS (NO SPAMMING OR LINKS)
Which stage of the problem-solving process involves identifying the inputs, process, and output for each solution? *
Definition of the problem
Develop the algorithm
Propose and evaluate possible solutions
Determine the most efficient solution.
Software used for professional print publications such as posters, books, and email newsletters is called a: *
Professional software
Word processing software
Desktop program
Desktop publishing software
Which of the following criteria does NOT determine the credibility of a source? *
How current the information is
The reputation the publisher
The article covers (speaks about) the topic being researched
The gender of the author
The process of finding a solution to a difficult or complex issue to make it easier is known as *
problem
problem-solving
input
A series of actions taken in order to solve a particular problem is known as the____________ *
process
problem
input
output
A finite set of unambiguous (no uncertainty, clear) instructions that can be performed in a prescribed sequence to achieve a certain goal is called a/an *
problem
output
algorithm
input
Which is the third step in the problem-solving process? *
Propose possible solutions
Test and evaluate the solution
Select the most effective solution
Defining the problem
A list of sources you used when writing a scholarly article on a specific subject is known as a: *
intellectual-property
credibility
bibliography
trademark
Which of the following are you able to create with the use of desktop publishing software? *
1 point
E-Book
Banner
All of the above
Newsletter
Which of the following is NOT a writing style format for academic purposes? *
Times New Roman
American Psychological Association
Modern Language Association
The right by an individual to protect his/her literary work such as poems, songs, and drawing is known as *
plagiarism
copyright
industrial property
trademark
Through the use of technology we can easily: *
SELECT ALL THAT APPLY. HINT: ONLY TWO OF THE 4 ARE CORRECT.
say more traditional jobs being available
agree that there are fewer emerging jobs
sell goods and services as we’ve never been able to
produce more jobs which will create growth and development in the country.
Answer:
finding a suitable solution for issue can be accomplished by following the basic four-step problem solving process and methodology outlined.
always follow the routine "clean up while in use and clean up before keeping it".
true or false
Which pieces of information does the National Weather Service produce?
simple maps
newspaper maps
long-range forecasts
maps with isothermsHow are computers used in producing weather forecasts?
They compile data from multiple instruments.
They collect air temperature and air pressure data.
They eliminate the need for human meteorologists.
They transmit data on developing weather systems from space.
Answer:
1. maps with isotherms
2. They compile data from multiple instruments.
Explanation:
The pieces of information that the National Weather Service produces are "maps with isotherms". These pieces of information depict the range of temperature and pressure occurring on the surface of the earth. Thereby providing a weather forecast that predicts the future occurrence of climate changes, which is then used to protect and enhance the lives of Americans.
Computers " compile data from multiple instruments" in producing weather forecasts. Instruments such as anemometer, wind vane, pressure sensor, thermometer, hygrometer, and rain gauge. The computer then uses specific mathematical equations to predict the weather or climate change.
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
How many passes will it take to find 12 using a binary search? 8, 10, 12, 14, 16, 18, 20
1 3 4 2
Answer:
3 passes
Explanation:
Binary search halves and halves an ordered list of numbers until the value being searched is found.
14 is the middle number. it is larger than 12 so we look at the left side
10 is the middle number of the left side it is smaller than 12 os we look at the right side
12 is the middle number between 10 and 14 and it is also the number we are trying to find.
PLZZZ HELP
Escaping Literal Quotes in Strings (JavaScript)
first pic is instructions
second pic is the code I have
Also, please provide feedback on the code I have.
WILL GIVE BRAINLIEST'
WILL REPORT ALL SCAMS
Answer:
If you just want to escape string literals, here are the ways to do it. There are at least three ways to create a string literal in Javascript - using single quotes, double quotes, or the backtick (). So, if you enclose your string in single quotes, no need to escape double quotes and vis versa.
Explanation:
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:
Answer:
participle is singing
word it modifies is voice
why should information technology NOT be taught in school?
Explanation:
Technology should not be used to teach in school as it can lead to distractions. With kids wanting to explore other sights, cheating, and communicating with others. Also, it can be expensive to purchase the technology for everyone as it can be a major investment with hundreds or thousands going into it. Technology also requires a lot of training by having to adapt lessons compatible with the systems and making sure the software is secure.
5.20 LAB: Output values below an amount Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Ex: If the input is: 5 50 60 140 200 75 100 the output is: 50,60,75,
Answer:
Following are the code to the given question:
x= input()#defining a variable x that inputs value from the user-end
l = x.split(" ")#defining variable l that splits the x variable value with a space
t= int(l[len(l)- 1])#defining a variable t that decrease the l length and convert the value into integer
for i in range(1, (len(l) - 1)):#use for loop to calculate the range of the list
if int(l[i]) < t:#defining if block that checks the list value is lessthan t
print(l[i])#print list values
Output:
Please find the attached file.
Explanation:
In the above-given code, an "x" variable is declared that inputs the value from the user-end, and use the "l" variable that splits all the value and defined a "t" variable that adds value into the list and convert the value into an integer.
In the next step, for loop is declared that counts the lists and use a conditional statement that checks list value is less than t and use the print the method that prints the list values.
List two examples of following types of communication
Answer:
Explanation:
sign language is communication
touch is communication
Describe at least three of the characteristics that project managers look for in project participants and explain why you think they are important
Answer:
1. Knowledge of Project Management Principles: A project participant should have the required knowledge of how project management works and how to function well in a team to achieve a common goal.
2. Time management skills: Despite the fact that it might be teamwork, the effectiveness of each individual is key. Every team member should be able to meet deadlines so as not to burden the team when they are given an individual task.
3. Excellent Communicator: A project participant should be able to communicate well with other team members, the project manager, different audiences, even customers and potential customers. Any weakness in communication skills could affect the project generally.
why you think they are important
1. Having knowledge of project management principles would lessen work and save time for the project manager and other team members as the project participant would have an idea per time of what to do.
2. A project participant that can manage time would generally increase the efficiency of the company, help the company meet deadlines, help the team meet targets.
3. Any weakness in communication skills could affect the project generally.
Which print preview of your slide show includes a notes section for your audience?
Answer:
I would say the one on the left side, have a good day! :)
Explanation:
I hope this helps! :)