i neeeeeeeeeeeddddddddddddd help plz ppl

I Neeeeeeeeeeeddddddddddddd Help Plz Ppl

Answers

Answer 1

Answer: white

Explanation: just read the question more carefully ?? It helps me to underline things sometimes. It may help you. Best of luck

Answer 2
Answer is white lol

Related Questions

Question 1(Multiple Choice Worth 5 points)
(03.01 MC)

Which line of code will only allow a non-decimal point to be stored in a variable?

candyCost = int(input("How much is the candy?"))
candyCost = input("How much is the candy?")
candyCost = float(input("How much is the candy?"))
candyCost = str(input("How much is the candy?"))
Question 2(Multiple Choice Worth 5 points)
(03.01 MC)

Cheri's teacher asked her to write a program using the input() function. What will this allow her program to do?

Add comments to the code
Allow others to understand the code
Display a string on the screen
Make the program interactive
Question 3(Multiple Choice Worth 5 points)
(03.01 MC)

Jabari is writing a program which prompts a user for a value that is negative and has a decimal. Which function should he use?

float()
int()
print()
string()
Question 4(Multiple Choice Worth 5 points)
(03.01 LC)

In programming, what is a string?

A cable that connects a computer to hardware
A method of threading code into a computer
A system of organizing letters alphabetically
A way to store a sequence of letters, numbers, or symbols
Question 5(Multiple Choice Worth 5 points)
(03.01 LC)

Which function converts the user's input to a number without a decimal?

float()
int()
print()
string()

Answers

Answer:

b

Explanation:

it's not a c or d and now I have to make it 20 characters long so I will do this

B is the answer lol yeah I had that some answer

Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?

A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.

Answers

Answer:

C. Configure a safe sender

Explanation:

It’s dabest thing to do

As per the given scenario, Walt should need to configure a safe sender. The correct option is C.

What is configuration?

A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.

Configuration frequently involves picking the right hardware, software, firmware, and documentation.

A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.

The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.

Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.

Thus the correct option is C.

For more details regarding configuration, visit:

https://brainly.com/question/13410673

#SPJ2

Does anyone know how to copy and paste on Linux please don't answer just for points and if I good I will give brainly

Answers

Answer:

Just copy the one which you want to copy and then after paste it where you want to do

Click on everything then press crlt C then copy wee u need to but click curlt V

what is the best scenerio for

Answers

Answer:

the teacher said a (dash) reads pages on website pls answer me now i have to write it now

For what???????? I don’t understand

Google Docs, MS Word, Google Slides, MS PowerPoint, Google Sheets, MS Excel In your opinion which software in each category is easier to use?

Answers

Answer:

ms word and ms excel

Explanation:

because thwy are easier to use for begineers

Google docs, it simple to use if your typing an essay!

For which programming task would you use a for loop?
A. Computing the average of a list of integers of unknown length
B. Counting the vowels in a document of unknown length
C. Generating a list of the anagrams in a word Printing a specified number of integers in a list
D. Printing a specified number of integers in a list

Answers

Answer:

A. Computing the average of a list of integers of unknown length

I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My teacher assigned me to the group that think we are not to dependent on our electronics when i dont even support that side sooo i need help coming up with topics that help support the side that im on. ( that probably did not make any sense)

Answers

Answer:

I think we are so this is hard lol

Explanation:

we are not too dependable

things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online

this is hard if I can think of any others I'll come back I'm sorry if this isn't any help

Yes we are dependable we use our phones everyday

Be sure to answer the following in complete and detailed sentences.

1. What might be a benefit of wirelessly connecting smart devices in a physical computing project?
2. How might you connect more than two micro:bits to activate multiple outputs triggered by one micro:bit?
3. How do batteries and other types of power sources make physical computing systems more mobile? Why is that helpful?

Answers

Answer: 1, 3

Explanation:

1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!

3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.

Answer:1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!

3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.

Explanation:

what are some basic commands to remember in terminal? windows 10

please help if you know

Answers

Answer:

If you just need a few, maybe this can help.

Explanation:

Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.

Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.

Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.

Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.

Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.

1.Assoc

Most files in Windows are associated with a specific program that is assigned to open the file by default. At times, remembering these associations can become confusing. You can remind yourself by entering the command assoc to display a full list of filename extensions and program associations. You can also extend the command to change file associations. For example, assoc .txt= will change the file association for text files to whatever program you enter after the equal sign. The assoc command itself will reveal both the extension names and program names, which will help you properly use this command.

In Windows 10, you can view a more user-friendly interface that also lets you change file type associations on the spot. Head to Settings (Windows + I) > Apps > Default apps > Choose default app by file type

2.Cipher

Deleting files on a mechanical hard drive doesn't really delete them at all. Instead, it marks the files as no longer accessible and the space they took up as free. The files remain recoverable until the system overwrites them with new data, which can take some time. The cipher command, however, lets you wipe a directory on an NTFS-formatted volume by writing random data to it. To wipe your C drive, for example, you'd use the cipher /w:d command, which will wipe free space on the drive. The command does not overwrite undeleted data, so you will not wipe out the files you need by running this command.

When you run the cipher command by itself, it returns the encryption state of the current directory and the files it contains. Use cipher /e: to encrypt a file, cipher /c: to retrieve information about encrypted files, and cipher /d: to decrypt the selected file. Most of these commands are redundant with the Windows encryption tool BitLocker.

3.file Compare

You can use this command to identify differences in text between two files. It's particularly useful for writers and programmers trying to find small changes between two versions of a file. Simply type fc and then the directory path and file name of the two files you want to compare.

You can also extend the command in several ways. Typing /b compares only binary output, /c disregards the case of text in the comparison, and /l only compares ASCII text.

So, for example, you could use the following:

fc /l "C:\Program Files (x86)
The above command compares ASCII text in two Word documents.

4.Ipconfig

This command relays the IP address that your computer is currently using. However, if you're behind a router (like most computers today), you'll instead receive the local network address of the router.

Still, ipconfig is useful because of its extensions. ipconfig /release followed by ipconfig /renew can force your Windows PC into asking for a new IP address, which is useful if your computer claims one isn't available. You can also use ipconfig /flushdns to refresh your DNS address. These commands are great if the Windows network troubleshooter chokes, which does happen on occasion.

5.Netstat

Entering the command netstat -an will provide you with a list of currently open ports and related IP addresses. This command will also tell you what state the port is in; listening, established, or closed.

This is a great command for when you're trying to troubleshoot devices connected to your PC or when you fear a Trojan infected your system and you're trying to locate a malicious connection.

6.Ping

Sometimes, you need to know whether or not packets are making it to a specific networked device. That's where ping comes in handy.

Typing ping followed by an IP address or web domain will send a series of test packets to the specified address. If they arrive and are returned, you know the device is capable of communicating with your PC; if it fails, you know that there's something blocking communication between the device and your computer. This can help you decide if the root of the issue is an improper configuration or a failure of network hardware.

7.PathPing

This is a more advanced version of ping that's useful if there are multiple routers between your PC and the device you're testing. Like ping, you use this command by typing pathping followed by the IP address, but unlike ping, pathping also relays some information about the route the test packets take.

List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)

Answers

Answer:

There are several different industries that are involved in the production and use of computers. These industries include:

Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.

Answer:

Hardware Manufacturers

Software Developers

System Integrators

Service Providers

Data Providers

ISP

Cloud Computing Providers

Consulting Firms

Explanation:

It is in order..

What are the pros and cons of doing research for homework projects online over using offline resources like libraries?

Answers

Here is my answer






Pros: like you’re phone it could be portable and easy to use unlike a library you can’t take a while library with you like in your pocket



Con: the stuff you could be trying to find out could be wrong or there is millions of answers that are not all the same
Distractions are everywhere online although it’s quick and easy, but offline sources encourage reading and a variety of answers

How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!

A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.

B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.

C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.

D)esident viruses load themselves into memory while non-resident viruses find networks to infect.

Answers

Answer:

The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.

D is the correct answer! :)

How do I make time go by faster?? school is so boring gosh..

Answers

Answer:

don't look at the time

Explanation:

it goes by fatser when you don't look oh and just zone out and just day dream it helps me alot

don’t focus on the time, when i was in math class i would actually focus and time went by so fast :p

1. How can you help prevent being a target of cyberbullying?

2.What can you do if someone you know is cyberbullying others?

Answers

1. stand up for yourself, keep your socials on private and only accept for your close friends and relatives.

2. screenshot and print out evidence, show to a trusted adult and even you can take legal action.
1. stand up for yourself.

2. tell a trusted adult.

plz help brainly and ill give as much points as possible

plz help brainly and ill give as much points as possible

Answers

Copy and paste: My personal creativity when crating video games simply comes from my spirit to always be different. Most video games that are very popular now are because they are creative in their own way and don’t replicate other games. One day I will make a game and use pure creativity in it and hope it becomes really big one day. Reward, risk/loss, and levels could create a nice sports game and these elements are seen in almost all video games. I’m going to start with a reward for winning the game, then every 5 games you win you move on to the next level. If you lose fail a level more than 3 times you will be placed in the previous level. In real life, the casino is an example of how real-life uses rewards to keep people coming back for more. People are so addicted to gambling in casinos because of the money earning process. You could either win money from the casino or lose money. Generally, many people gamble huge amounts of money at the casino, this is why parents encourage you not to gamble when you get older. The way my game would get more intense as you play it is by colors and music and size. On the first level, all of your obstacles will be large and have solid colors with delightful music. Then going into more levels the obstacles will be smaller making it harder for the player to aim where he’s going, The colors of the obstacles would be transparent so that its harder for players to know where to move their character to, and the intense music that start to creep in makes it harder for the player to concentrate, this makes the player more nervous and gives anxiety every time he/she fails. Intensity is important in games or else they would be too easy, the easier the game is the more boring it gets. Although the game may get more frustrating every level you do, There are cash cups that the more competitive players get, however, to compete in cash cups you have to achieve level 30. This gives the player a better reason to not quit the game. Games can be very challenging but when they think about the fact of earning money from games it gives them a reason to not quit. My game will be Unique and I will make sure That it is different from others in many ways.

This dude got it under control

• Use variable to create the number 0 at location 0, 400.
• Use the counter pattern to increase the size of the number by 1 continuously after the run button is clicked.

(javascript btw)

Answers

Answer: i thinks its

Explanation:

$('button')

 .html('Click me') // Try edit it...

 .on('click', () => console.log(''))

.on('click', () => console.log(''))

.on('click', () => console.log(''))

console.log('App started')

The answer above is correct I checked, hope this helps :

Match List

Match each term to its definition.

Put responses in the correct input to answer the question.

Correct answers:
1
a value that can be passed to a function
2
a group of instructions that can be used to organize a program or perform a repeated task
3
a value that can be passed from a function back to the calling part of a program

Match ListMatch each term to its definition.Put responses in the correct input to answer the question.Correct

Answers

Return Value - A value … part of a program
Parameter - A value … function
Function - A group

Answer:

parameter: a value that can be passed to a function

function: a group of instructions that can be used to organize a program or perform a repeated task

return value: a value that can be passed from a function back to the calling part of a program

Explanation:

STAY SAFE!!

MAY YOU AND UR WHOLE FAMILY LIVE FOR MORE THAN 100 YEARS!!!


JUST BECAUSE SOME OF THE PASSED AWAY DOESN'T MEAN THEY ARE STILL NOT WITH YOU

ITS LIKE PLANETS THEY ARE FAR AWAY FROM EACH OTHER, BUT THE FORCE OF LOVE KEEPS THEM TOGETHER!!

ITS TOO STRONG TO BE BROKEN!! :) <3 <3

WHOEVER HAS THE BEST AND NICE AND SWEET COMMENT GETS BRAINLIEST!!

Answers

Answer:

The true words of a wise and noble man

Explanation:

Also, whatcha think about Nevada and Pennsylvania finally turning in their ballots, and making Biden 2020 happen?

Omg thank you so much you are an angel i hope u have the BEST day ever king/queen! So how’s ur day, good I hope we’ll have a good one!

1. Why is it important to know how to create a slide?

2. How can you utilize the knowledge in making a slide as a student?​

in own sentence pls

Answers

1. Knowing how to create a slide is important because it is a useful tool for organizing and presenting information in a visual and engaging way, which can help to enhance communication and understanding.

2. As a student, knowing how to create a slide can be beneficial for presenting research findings, summarizing key information, and organizing study materials in a clear and visually appealing way to aid in the learning process.

Answer:

1. Because slides help in improving visual aids. It improves understanding when teaching student.

2. You can make projects, shows, teach others, and play with it just for fun

Explanation:

Ummm, guys, can anyone tell me what the h e l l this is? it says the site is not secure and i found this inside tanktrouble.com. PLEASE HELP ME IM SCARED A F.

Answers

Answer: This site is brainly and it is secure, calm down dont be scared

Explanation: Brainly is something where you ask people questions of what ever you want and you can get answers from somebody and you can get 5 points if you answer somebodys questions.

but this site is Secure and it’s a good site

The image below could be considered to be a typical conference room. Imagine that you have to present to your corporate team in this room. What are a few things you would have to consider when presenting in this room?

The image below could be considered to be a typical conference room. Imagine that you have to present

Answers

Answer: presenting new ideas for new tech and new ways to improve todays society with tech ways to improve the company.

Explanation:

Well first of all it would depend on the business bit probably while writing i would consider spelling grammar and maybe add a little joke but while presenting i would focus on everyone’s facial expressions from what i know expressions are the most important thing because they tell you if you’re bombing or doing ok

Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )

Answers

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.

List out the process of Assembly in the film editing process. NO LINKS. answer ASAP

Answers

Answer:

just try your best

Explanation:

When you make a film, you need to follow an organised process. It’s best to think of filmmaking as three distinct stages:

planning and getting ready to film (development and pre-production)
filming (production), and
completing the film and getting it ready to show (post-production).

How do I bypass blocksi on my school Chromebook

How do I bypass blocksi on my school Chromebook

Answers

Answer:

Open Chrome Settings.

Click on the “Privacy”

Under “Content restrictions,” click on the “Block sites” button.

Enter the website address in the “URL” box and click on the “Add site” button.

Explanation:

you could power wash/reset your computer then delete the blocking site

PLZ HELP ME!!
Give two reasons why it is important to properly train workers within an organization.

Answers

Answer:

To avoid the making of many mistakes

To make it easy for them to work

The workers will make less mistakes which means less backlash from customers

No manager wants their employees to not know what they are doing

List at least one thing to check for when you're checking the clarity and professionalism of a document.

Answers

Answer:

Company Style. Verify that the tone and style of the document matches the document type and purpose. ...

Format Review. ...

Grammar and Spelling. ...

Layout Critique. ...

Confirm Accuracy. ...

Answer:

1. Read the cover letter to make sure it's specific, professional, and clear.

2. If you see anything you'd like to change, do that now. Edge 2022

Explanation:

Trust my doppelganger

What is output?
Print (12 % 5)

Answer
0
5
2
1

Answers

It’s 5. Hope it helpsss
5 because most outputs are usually smaller then the input so that makes 5 the output

georgenotfound??? question mark??

Answers

Answer:

hi

Explanation:

hehehehehe bye bruh

A college campus uses robots to give students tours. The prospective students can ask the robot questions about life on campus. The robot allows the visiting student to choose which parts of campus to visit. What best describes the type of AI possessed by the robot?

weak AI

neural network AI

symbolic AI
Strong AI

Answers

The type of AI possessed by the robot in this scenario is Weak AI, also known as Narrow AI or Applied AI.

Weak AI is designed to perform a specific task, and it operates within a limited domain. The robot in this scenario is programmed to give tours of the campus and answer questions about life on campus. It does not have general intelligence, consciousness, or the ability to think and reason like a human being, and it cannot perform tasks outside of its programmed capabilities.

In contrast, Strong AI, also known as Artificial General Intelligence (AGI), is a theoretical form of AI that would possess human-like intelligence and the ability to reason and perform any intellectual task that a human can do. However, Strong AI does not currently exist.

Neural network AI and Symbolic AI are categories of techniques and approaches used in the development of AI, and they can be applied to both Weak AI and Strong AI systems. Neural network AI involves developing algorithms that are modeled after the structure and function of the human brain, while Symbolic AI involves creating AI systems based on a set of rules or symbols. However, the type of AI possessed by the robot in this scenario is more specifically described as Weak AI.

weak Al other wife knows as Apllied Al

Your friend Tegan is designing a game that involves cats taking over the world. She wants to use obstacles that are difficult at first, and then use simpler obstacles as the game progresses. Would you try to change her approach? Why or why not?

(game design)

Answers

Answer:

I would put levels ranging for level 1 to 50, and start off simple and easy but the game becomes hard during the player plays.

Explanation:

You would start of simple for users to understand what is going on then gets harder as the game progresses
Other Questions
The range for the given domain of function f(x)= 3x-6 over x +4. 5 is what Figure A is a parallelogram with a base length of 5 units on a coordinate plane. Figure B results from dilating Figure A by a factor of 4 by a factor of 4 and translating 6 units down. What is the base length of Figure B? how do chlamydia infections in tropical countries differ from those in the united states? Question 12(Multiple Choice Worth 5 points)(02.07 MC)In the figure shown, what is the measure of angle x?40DB70O 100 degreesO 110 degreesO 120 degrees140 degrees In what fundamental ways does the potential conflict between the Lake-men, Wood-elves, and dwarves differ from the Battle of the Five Armies that eventually comes to pass? Point to specific examples in the text to support your response. Which of the following environments are low-level areas that can be temporarily or seasonally filled with water? RainforestSwampTundraWetland giving brainlist HAS TO BE RIGHT Rosa is making a game board that is16 inches by 24 inches. She wants touse square tiles. What is the largesttile she can use?Please show working What was one element of President Roosevelt's Good Neighbor Policy?A. Central and South American countries agreed to provide militaryaid to the United States if it were ever attacked.OB. The United States and Central and South American countriesagreed to join any conflict against aggressive regimes in Europeand Asia.OC. The United States agreed to support Central and South Americancountries militarily if they were attacked by European powers.OD. The United States and Central and South American countriesagreed to economic cooperation to protect their shared interestsin the western hemisphere. Match the jobs with the education requirements.clinical psychologistconciergecosmetologistvocational school and state lIcensureon-the-job trainingPh.D. with lIcensure or certification, depending on the state in which youIlvea bachelor's degree In early childhood developmentchildcare director for one of the three maps, describe features that indicate former positions of the stream channels. do all three maps show this information? a research study was testing the hypothesis that people with a higher body temperature would report being symptoms of anxiety. after collecting the data the research team realized the thermometer they were using to measure body temperature was not giving consistent results. their measurement of body temperature was brainliest goes to whoever answers the question correctly also if you want more points answer my other questions sexual harassment occurs when sexual favors are demanded in return for job opportunities, promotions, salary increases, or other benefits.True Match the type of Entrepreneurship to the description that best fits.Has an ideal, product or service for the business worldStart up their business due to their lifestyles such as sports hobbies or passionsHas to innovative ideas for social change, solutions, etc.Has multiple startups do to new ideas.1. Business Entrepreneur2. Social Entrepreneur3. Serial Entrepreneur4. Lifestyle Entrepreneur A business will not be successful unless it charges a price for its products that covers its total ONLY TRUE ANSWER [BRAINLY] Marcus and Judy are picking apples. At the end of the day, Marcus has p apples. Judy has 5 times as many apples as Marcus.Which expression represents the number of apples Judy has in terms of p?A p 5B 5 + pC 5/pD 5p Choose the correct part of speech for the underlined word because of their proximity to each other, linked genes often stay together (i.e., do not separate due to crossing over). as a result, what process is considered to occur only infrequently with these genes? 10. What is the exponent in this equation: 5*(x-2) = 125 *OX-25O125 In WXY, the measure of Y=90, WY = 5, XW = 13, and YX = 12. What ratio represents the cosine of X?