Answer:
I believe it is just a task. Since there exists(on windows) the Task Manager application, where you can stop any running task, I think that they are called tasks
Explanation:
In most operating systems, a running application is typically referred to as a process. A process is an instance of a program that is being executed by the operating system. It represents the execution of a set of instructions and includes the program code, data, and resources required for its execution.
Each process has its own virtual address space, which contains the program's code, variables, and dynamically allocated memory. The operating system manages and schedules these processes, allocating system resources such as CPU time, memory, and input/output devices to ensure their proper execution.
The operating system provides various mechanisms to manage processes, such as process creation, termination, scheduling, and inter-process communication.
Learn more about operating systems here:
brainly.com/question/33924668
#SPJ6
fine the average of 5,2,3
Answer:
3 1/3
Explanation:
What is cybersecurity? Cybersecurity refers to the protection of hardware?
Cybersecurity is the practice of safeguarding computer systems, networks, and mathematical data from unauthorized approach, theft, damage, or additional malicious attacks.
What is cybersecurity?It involves the use of differing technologies, processes, and practices to secure digital maneuvers, networks, and data from a wide range of dangers, including cybercrime, cyber-spying, cyber-terrorism, and different forms of malicious endeavor.
While cybersecurity does involve protecting fittings, it also involves looking after software, networks, and digital dossier. In addition to protecting against external warnings, etc.
Learn more about cybersecurity from
https://brainly.com/question/28004913
#SPJ1
PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
________________________________________
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses. ________________________________________
Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.
Write your pseudocode here:
________________________________________
Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Conclude the program with the main() statement.
5. Include at least two print statements and two variables.
6. Include at least four input prompts.
7. Use concatenation to join strings.
8. Follow the Python style conventions regarding indentation in your program.
9. Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.
Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE.
When you submit your assignment, you will attach this Python file separately.
________________________________________
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.
btw don't talk unless you are answering the question
Answer:
i can only give you pseudocode my fren
Explanation:
# information about me
def main():
MyName = “malaki”
print(myName)
myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”
print(myInfo)
main()
sorry if this did not help :( i tried
In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.
What is pseudocode?Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.
Pseudocode is a description of the steps in an algorithm using simple or everyday language. In essence, a pseudocode uses straightforward (concise) words and symbols to summarize the steps taken during a software development process.
Consequently, the following are some characteristics of a pseudocode as the Pseudocode needs to be clear, Pseudocode ought to be ending. Executable pseudocode is required.
Therefore, In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.
Learn more about language on:
https://brainly.com/question/20921887
#SPJ2
package Unit3_Mod2;
public class ImageExample3 {
public static void main (String[] argv)
{
int[][][] A = {
{
{255,200,0,0}, {255,150,0,0}, {255,100,0,0}, {255,50,0,0},
},
{
{255,0,200,0}, {255,0,150,0}, {255,0,100,0}, {255,50,0,0},
},
{
{255,0,0,200}, {255,0,0,150}, {255,0,0,100}, {255,0,0,50},
},
};
// Add one pixel on each side to give it a "frame"
int[][][] B = frameIt (A);
ImageTool im = new ImageTool ();
im.showImage (B, "test yellow frame");
}
public static int[][][] frameIt (int[][][] A)
{
//add code here
}
}
Make a yellow frame , one pixel to each side.
Answer:
To add a yellow frame of one pixel to each side of the input image represented by a 3D array A, we can create a new 3D array B with dimensions A.length + 2 by A[0].length + 2 by A[0][0].length, and set the values of the pixels in the frame to the RGB values for yellow (255, 255, 0).
Here is the implementation of the frameIt method:
public static int[][][] frameIt(int[][][] A) {
int height = A.length;
int width = A[0].length;
int depth = A[0][0].length;
int[][][] B = new int[height + 2][width + 2][depth];
// Set the values for the corners of the frame
B[0][0] = new int[] {255, 255, 0, 0};
B[0][width + 1] = new int[] {255, 255, 0, 0};
B[height + 1][0] = new int[] {255, 255, 0, 0};
B[height + 1][width + 1] = new int[] {255, 255, 0, 0};
// Set the values for the top and bottom rows of the frame
for (int j = 1; j <= width; j++) {
B[0][j] = new int[] {255, 255, 0, 0};
B[height + 1][j] = new int[] {255, 255, 0, 0};
}
// Set the values for the left and right columns of the frame
for (int i = 1; i <= height; i++) {
B[i][0] = new int[] {255, 255, 0, 0};
B[i][width + 1] = new int[] {255, 255, 0, 0};
}
// Copy the original image into the center of the new array
for (int i = 0; i < height; i++) {
for (int j = 0; j < width; j++) {
for (int k = 0; k < depth; k++) {
B[i + 1][j + 1][k] = A[i][j][k];
}
}
}
return B;
}
Note that the RGB values for yellow are (255, 255, 0), but since the input array is using a 4-channel representation with an alpha channel (transparency), we are setting the alpha channel to 0 for all the yellow pixels. This means that the yellowframe will be fully opaque.
Hope this helps!
A customer calls in and is very upset with recent service she received. You are trying to calm the customer down to come to a resolution but you are not sure how to best do so
It's crucial to maintain your composure and show empathy while interacting with a frustrated customer. Actively listen to their worries and express your regret for any hardship you may have caused.
Can you describe a moment where you dealt with an angry or upset customer in the past?You can use the STAR approach to share a tale about a time when you had to face an irate client in person. Situation: "A client arrived at my former employment screaming and cursing the workers. She was lamenting because she didn't have her receipt when she tried to return an item.
What are the 5 C's of complaint?The 5Cs approach of formal presentation, where the Cs stand for Principal complaint, Course of sickness.
To know more about customer visit:-
https://brainly.com/question/13472502
#SPJ1
Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so?
Ctrl+G
Ctrl+K
Ctrl+C
Ctrl+Shift+G
Answer:
Ctrl+K
Explanation:
Edg 2020
B on edg 2021, hope i could help
describe each of the following circuits symbolically. use the principles you have derived in this activity to simplify the expressions and thus the design of the circuits
The Ohm's law states that the current passing through the conductor is proportional to the voltage applied across its ends. Kirchhoff's law applies to the conservation of charge and energy in an electric circuit. Series resistors are combined end-to-end, and their combined value is equal to the sum of the individual resistors. Parallel resistors, on the other hand, are combined side-by-side, and their combined value is equal to the reciprocal of the sum of the individual resistors.
In electronic circuit diagrams, symbols represent circuit components and interconnections. Electronic circuit symbols are used to depict the electrical and electronic devices in a schematic diagram of an electrical or electronic circuit. Each symbol in the circuit is assigned a unique name, and their values are typically shown on the schematic.In the design of circuits, it is crucial to use the principles to simplify expressions.
These principles include Ohm's law, Kirchhoff's laws, and series and parallel resistance principles. The Ohm's law states that the current passing through the conductor is proportional to the voltage applied across its ends. Kirchhoff's law applies to the conservation of charge and energy in an electric circuit. Series resistors are combined end-to-end, and their combined value is equal to the sum of the individual resistors. Parallel resistors, on the other hand, are combined side-by-side, and their combined value is equal to the reciprocal of the sum of the individual resistors. Therefore, in circuit design, simplification of the circuits can be achieved by applying these principles.
For more such questions on Ohm's law, click on:
https://brainly.com/question/231741
#SPJ8
Identify a logical operation (along
with a corresponding mask) that, when
applied to an input string of 8 bits,
produces an output string of all 0s if and
only if the input string is 10000001.
Answer: Provided in the explanation section
Explanation:
The Question says;
Identify a logical operation (along
with a corresponding mask) that, when
applied to an input string of 8 bits,
produces an output string of all 0s if and
only if the input string is 10000001.
The Answer (Explanation):
XOR, exclusive OR only gives 1 when both the bits are different.
So, if we want to have all 0s, and the for input only 10000001, then we have only one operation which satisfies this condition - XOR 10000001. AND
with 00000000 would also give 0,
but it would give 0 with all the inputs, not just 10000001.
Cheers i hope this helped !!
Miranda works in a product-testing laboratory. New products come in for testing frequently. As the products come in, test protocols are developed. Testers in several different departments perform different tests and record their results. The results are then compiled into a database. The project manager reviews the test results and writes up a report describing the findings. When the business was small, it was easy for the company to share these documents using e-mail. But now the laboratory has grown. It receives many more products for testing and has hired many more employees. As a result, e-mail is no longer an efficient way in which to handle the exchange of documents. For this reason, Miranda implemented the use of a new tool. What technology did Miranda adopt?
The technology that Miranda adopt is a wiki. The correct option is d.
What is technology?Technology is the application of scientific knowledge and information to make new gadgets and equipment which work for the welfare of society. Technology is overcoming the problems of society with new scientific gadgets.
Here, Miranda works in a product-testing laboratory. The lab should make new and technical equipment. She needed a new tool for the lab, so she should opt for a wiki for the information on new techniques.
Therefore, the correct option is d, a wiki.
To learn more about technology, refer to the link:
https://brainly.com/question/28288301
#SPJ1
The question is incomplete. Your most probably complete question is given below:
a blog
a fax machine
a wiki
will give brainlyist
Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.
i think its the first sentence: Mobile devices have become the main source of communication for many people around the world
if im wrong im dum ;-;
Answer:
Customized advertising can be integrated based on specific users location.
Explanation:
Right for Plato/edmentum
1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE
2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above
Answer: 1 is A
2 is D
Explanation:
Describe why some people prefer an AMD processor over an Intel processor and vice versa.
Answer: AMD’s Ryzen 3000 series of desktop CPUs are very competitive against Intel’s desktop line up offering more cores (16 core/32 thread for AMD and 8 core/16 thread for Intel) but with a lower power draw - Intel may have a lower TDP on paper but my 12 core/24 thread 3900x tops out at around 140W while a i9 9900K can easily hit 160W-180W at stock settings despite having a 10W lower TDP.
At which stage of problem solving should you discuss the problem with colleagues?
The stage of problem solving one should discuss the problem with a colleague is defining the problem.
How to explain the informationTo begin developing a problem-solving approach, it's critical to recognize the issue at hand. It will be more difficult to determine a solution if you can't collectively recognize the issue.
Although each phase in the problem-solving process is critical, defining the problem comes first since without it, the other processes are meaningless.
The stage of problem solving one should discuss the problem with a colleague is defining the problem.
Learn more about problem on
https://brainly.com/question/7507783
#SPJ1
Computer one on network A, with IP address of 10.1.1.8 want to send a package to computer to with IP address of 10.1.1.205. Taking in consideration that computer one is sending an FTP request to computer to the store support on computer one is 21086, which of the following contains the correct information for the first TCP segment of data
Note that the right information for the first TCP segment of data in the given scenario is -
Source Port - 21086Destination Port - 21Sequence Number - 1 Acknowledgment Number - 2 Why is this so?Since Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21 (FTP default port),the sequence number would start at 1, and the acknowledgment number would be 2.
A TCP segment is a unit of data encapsulatedin a TCP /IP packet used for communication between devices over a network.
Learn more about TCP at:
https://brainly.com/question/18956070
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 10.1.1.205. Taking in consideration that computer 1 is sending a FTP request to computer 2, and the source port on computer 1 is 21086, which of the following contains the correct information for the first TCP segment of data?
Source Port: 5000
Destination Port: 80
Sequence Number: 1
Acknowledgment Number: 2
Source Port: 21086
Destination Port: 21
Sequence Number: 1
Acknowledgment Number: 2
Source Port: 21
Destination Port: 21
Sequence Number: 4
Acknowledgment Number: 1
Source Port: 80
Destination Port: 5000
Sequence Number: 1
Acknowledgment Number: 1
Answer:
Explanation:
Note that the right information for the first TCP segment of data in the given scenario is -
Source Port - 21086
Destination Port - 21
Sequence Number - 1
Acknowledgment Number - 2
Why is this so?
Since Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21 (FTP default port),the sequence number would start at 1, and the acknowledgment number would be 2.
A TCP segment is a unit of data encapsulatedin a TCP /IP packet used for communication between devices over a network.
What is an online payment gateway?
Answer:
it is the key component of the electronic payment processing system, or through which type of payment you are giving through.
Explanation:
brainiliest
I’m c language Print the two strings, firstString and secondString, in alphabetical order. Assume the strings are lowercase. End with newline. Sample output:
capes rabbits
Answer:
#include <stdio.h>
void printStringsInSameLine(char *firstString, char *secondString) {
printf("%s %s \n", firstString, secondString);
}
int main() {
char *firstString = "capes";
char *secondString = "rabbits";
printStringsInSameLine(firstString, secondString);
return 0;
}
Explanation:
In an executing process, the program counter points __________.
Answer:
To the next instruction to be executed and is incremented after each instruction has been executed.
Explanation:
Given that Program counter is a form of record or directory in a computer processor that has the location of the instruction that is currently being executed.
This it does in such a way that, following the execution of each instruction, the program counter increases the number of instructions it stored and immediately points to the subsequent instruction that follows.
Hence, in an executing process, the program counterpoints "To the next instruction to be executed and is incremented after each instruction has been executed."
How does one take personal responsibility when choosing healthy eating options? Select three options.
1 create a log of what one eats each day
2 increase one’s consumption of fast food
3 critique one’s diet for overall balance of key nutrients
4 identify personal barriers that prevent an individual from making poor food choices
5 eat only what is shown on television advertisements
The three options to a healthier eating culture are:
create a log of what one eats each daycritique one’s diet for overall balance of key nutrientsidentify personal barriers that prevent an individual from making poor food choicesHow can this help?Create a log of what one eats each day: By keeping track of what you eat, you become more aware of your eating habits and can identify areas where you may need to make changes. This can also help you to monitor your intake of certain nutrients, and ensure that you are getting enough of what your body needs.
Critique one’s diet for overall balance of key nutrients: A balanced diet should include a variety of foods from different food groups. By assessing your diet, you can determine whether you are consuming enough fruits, vegetables, whole grains, lean proteins, and healthy fats. If you find that you are lacking in any of these areas, you can adjust your eating habits accordingly.
Read more about healthy eating here:
https://brainly.com/question/30288452
#SPJ1
о
O
A. cache
C. URL
Attempts
A browser stores images and page elements in a on your device.
Save Answer
O
B. vault
D. cookie
A browser stores images and page elements in a on your device is cache. Therefore, option A is the correct answer.
Browser cache stores files needed by your browser to display the web sites it visits. This includes elements like the HTML file that describe the site, along with CSS style sheets, Javascripts, cookies, and images.
A browser cache is used to store web page elements such as images, scripts, and HTML files, so that when a user visits the same website again, the browser does not have to re-download all the elements. This helps to speed up page loading time and reduce bandwidth usage.
Therefore, option A is the correct answer.
Learn more about the browser stores here:
https://brainly.com/question/30549903.
#SPJ6
describe the impact of technology in your life . how does it affects your human relations with other people .
Answer:
Technology has a huge impact on my life, it has helped me visit places, talk to people, and captivate me. For example, using a car I have visited my friends and family. This is making a stronger bond with those people I visited. And, using my phone I can call and text people. this has led to making lots of friends and stronger relationships. Technology is important for human contact unless you want to ride carriages around the streets.
You can Hyperlink by:
Question 5 options:
Press CTRL+K (shortcut)
Go to Insert tab, Link Group, Click on Link Icon
Right click on a word / shape / picture and choose Link
All of the above /
Answer:
All of the above
Explanation:
I tryed them all
Which statement best describes Link State routing? Group of answer choices Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors All of these Each router uses a HELLO packet to announce its presence to its neighbors Each router builds a table with the best distance between each router and the link to use, based on each router’s providing data on distances to all the routers in its routing table to its nearest neighbors
Answer:
Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors.
Explanation:
A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.
Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.
I. Default gateway
II. IP address
III. Subnet mask
After a router successfully determines the destination network, the router checks the routing table for the resulting destination network number. If a match is found, the interface associated with the network number receives the packets. Else, the default gateway configured is used. Also, If there is no default gateway, the packet is dropped.
Basically, there are two (2) main categories of routing protocols used in packet switching networks and these includes;
1. Distance-vector routing.
2. Link state routing.
Link state routing refers to a complex routing technique in which each router learns about it's own neighborhood or directly connected networks (links) and shares the information with every other router present in the network.
Hence, the statement which best describes Link State routing is that, each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors. Some examples are intermediate system to intermediate system (IS-IS) and open shortest path first (OSPF).
Which of the following is a real job title on The interactive media career pathway?
Answer:
The right answer is A
Explanation:
Plzzzzzzzzzzzzz give me brainiest
You are about to deploy a new server that will contain sensitive data about your clients. You want to test the server to look for problems that might allow an attacker to gain unauthorized access to the server. This testing should not attempt to exploit weaknesses, only report them. What type of test should you perform?
Answer:
Vulnerability Scan
Explanation:
PLEASE PEOPLE WHO DO PYTHON PLEASE HELP ITS DUE IN THE NIGHT
if you do not know the answer please do not answer otherwise I will report.
the answer that works will get brainliest
Please help me debug this code
Answer:Yo i was just on this in codehs
Explanation:
def turn_right():
turn_left()
turn_left()
turn_left()
def jump_hurdle():
turn_left()
move()
turn_right()
move()
turn_right()
move()
turn_left()
while front_is_blocked():
jump_hurdle()
while front_is_clear():
move()
In the program below, numA is a
def multiply(numA, numB):
product = numA* numB
return product
answer = multiply(8,2)
print (answer)
parameter
qualifier
accumulator
return value
Answer:
parameter
Explanation:
In the function 'multiply' you can pass values in that are to be used inside the function. These are called 'parameters' and are in parentheses after the function name.
- A qualifier is a name that adds extra information, such as 'final' to prevent reassignment
- An accumulator is a variable you use to sum up a bunch of values
- A return value is a mechanism to pass the result of a function back to the calling program (into 'answer' in above example).
If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color
Answer:
watermark
Explanation:
A pop up blocker is a web browser feature that?
Answer:
blocks websites so you cant do them if your taking a test some of them wont allow pop up blockers and you will not be able to take the test or a website that does not accpet pop up blockers
Explanation:
Answer: prevents unwanted advertisements
Explanation:
Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all of the details of the engineering document management system described in the following narrative. You must draw at least a context diagram and a level-0 diagram. In drawing these diagrams, if you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Provide these extra explanations along with the diagrams.
Projects, Inc. is an engineering firm with approximately 500 engineers that provide mechanical engineering assistance to organizations, which requires managing many documents. Projects, Inc. is known for its strong emphasis on change management and quality assurance procedures. The customer provides detailed information when requesting a document through a web portal. An engineer is assigned to write the first draft of the requested document. Upon completion, two peer engineers review the document to ensure that it is correct and meets the requirements. These reviewers may require changes or may approve the document as-is. The document is updated until the reviewers are satisfied with the quality of the document. The document is then sent to the customer for approval. The customer can require changes or accept the document. When the customer requires changes, an engineer is assigned to make the changes to the document. When those changes are made, two other engineers must review those changes. When those reviewers are satisfied with the changes, the document is sent back to the customer. This may happen through several iterations until the customer is satisfied with the document
DFDs come in two varieties: logical and physical. Logical diagrams show the theoretical flow of information through a system, including the origin, route, transformation, and destination of the data.
What is context data flow diagram?Context diagrams concentrate on the interactions of your system with external elements. It is the most straightforward type of data flow diagram, offering a comprehensive perspective of the system and external entities in a manner that is simple to understand. It is also referred to as a level 0 data flow diagram due to its simplicity.DFD Another name for Level 0 is a context diagram. It provides a basic summary of the entire system or process that is being studied or modeled. The system is displayed as a single, high-level process, along with its relationship to external entities, in what is intended to be an overview view.The context diagram is divided into many bubbles and processes in 1-level DFD. In this level, we emphasize the system's primary functions and decompose the high-level DFD process into smaller processes.Learn more about context data flow diagram refer to :
https://brainly.com/question/12972996
#SPJ1
What does this button mean in the computer ????????
Answer:
Context menu
Explanation:
If you want to open a context menu this is the one
Alternative is Shift+F10 in most applications to open a context menu. It's basically the same thing as the menu key
Answer:
Context MenuExplanation:
this button mean in the computer