Answer:
oh no thanks not good
Explanation:
did you try it on a different device mabye a phone
Which of the following lines of code creates a division called answer?
A.
B.
C.
D.
Answer:
Explanation:
If you want the words “My puppy is a poodle” to appear in the output box, what Python code should you use?
A.
create “My puppy is a poodle”
B.
execute (“My puppy is a poodle”)
C.
print(“My puppy is a poodle”)
D.
print “My puppy is a poodle”
Answer:
i think it is B hope it helps
It wouldn't let me say it so I'm screenshotting it.
yes it happend to me if you go on my questions
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
What is the purpose of indexing?
A. To combine characters in order to form a single string
B. To combine two or more strings into one big string
C. To pull out a group of characters from a string
D. To pull out one specific character from a string
Answer:
D. To pull out one specific character from a string
Explanation:
Indexing allows you to access individual characters in a string directly by using a numeric value.
explain the history of computing of mechanical era
Answer:The Mechanical Era
Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.
Explanation:Hope this helped
heyy i hope ur doing greatt! i srs need help:'')
capital territory
dependent territory
disputed territory
Explanation:
i hope it can match
How does binary code control the processes in a computer.
Binary systems employ the code to comprehend user input and operational instructions and to offer the user with an appropriate output.
What is binary system?Binary system is defined as a numbering system where each digit can only have one of two values—0 or 1—and which serves as the foundation for all binary code used in computing systems. These systems make use of this code to decipher user input and operational directives and provide the user with the desired result.
The binary is read from, say, disk and loaded into memory. The memory contents are then loaded into a processor local resister according to a directive issued by the processor logic to the memory controller. The CPU then interprets it as a command to execute.
Thus, binary systems employ the code to comprehend user input and operational instructions and to offer the user with an appropriate output.
To learn more about binary system, refer to the link below:
https://brainly.com/question/2824068
#SPJ2
1. Why is it important to know how to create a slide?
2. How can you utilize the knowledge in making a slide as a student?
in own sentence pls
Answer:
1. Because slides help in improving visual aids. It improves understanding when teaching student.
2. You can make projects, shows, teach others, and play with it just for fun
Explanation:
3 different ways that ultrasonic sensors can be used in everyday life.
Answer:
Ultrasonic Sensors Uses:
Anti-Collision DetectionPeople DetectionContouring or ProfilingPresence DetectionBox Sorting using a Multi-Transducer SystemEasy Control of Trash Collection VehiclesPallet Detection with ForkliftsBottle Counting on Drink Filling MachinesLearn more about Ultrasonic Sensors here
Visit —
https://brainly.in/question/19907919
https://brainly.ph/question/13809853
Hope my answer helps you ✌️
Mark BRAINLIEST
CodeHS 2.1.4 Evidence collection.
Charles Babbage
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution:
Ada Lovelace
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution:
Alan Turing:
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution:
Mauchly and Eckert
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution:
ENIAC Programmers
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution:
Grace Hopper
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution:
Mark Dean
1. Time Period:
2. What did the term 'computer' mean?
3. Main contribution:
Bonus Exhibit
1. Who is missing from this picture?
2. What questions do you have about this image?
3. Why do you think some are included while others are not?
Final Report: Who invented the computer?
Claim:
Evidence:
I need help asap pls helpppp
Answer:
The term computer is derived from the Latin term 'computare', this means to calculate or programmable machine. Computer can not do anything without a Program. It represents the decimal numbers through a string of binary digits. The Word 'Computer' usually refers to the Center Processor Unit plus Internal memory.
Explanation:
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
The first person gets the brainiest!!!
Match the areas seen on the presentation program’s interface with their uses.
A. Placeholder
B. Speaker Note
C. Slide Master
D. Theme
1. default template for any new presentation
2. predefined appearance of a slide
3.used to insert the choice of items on a slide
4. guidelines that assist in delivering the presentation
Where is my Plato/ Edmentum at???
Answer:
1A
2D
3C
4B
Explanation:
:)
does anyone have rrrooobbllloooxx
Answer:
nope
Explanation:
can someone describe how sampling is used to capture audio on a computer?
please make it easy I am struggling. Im in 7th.
Answer: Sampling is a method of converting an analogue audio signal into a digital signal.
Explanation:
While sampling a sound wave, the computer takes measurements of this sound wave at a regular interval called sampling interval. Each measurement is then saved as a number in binary format.
Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )
I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.
I need help NOWW pls. My question is "Because of increasing advances in technology, there are careers available that weren’t even invented ten years ago. One such career is a social media manager. Research online what a person in this career does and explain how the need for this career developed. Then think of a technology that might be invented in the future and name a career that might develop from it." WORTH 23 PTS!!! HURRY ASAP......!!!! I'll just put Computers And Technology but it's middle school grade 6 career!!!
Answer:
A social media mangers are in charge of the company social media. They usually respond to comments, advertise the stuff they have and create content. This career has taken off since it first began and has become more popular for both practitioners and researchers.
Explanation:
Answer:
What about a self driving airplane. This way, all you would have to do is make sure it works
Explanation:
Part 1: Plan and Write the Pseudocode
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
Decide on the message you would like to display to the screen. Some ideas include:
Your favorite book title or TV show and why you like it
A few sentences sharing information about you
Your favorite sport and team or athlete
Use two variables to store your message.
What would you recommend doing for this part?
Answer:
I would recommend doing a favorite TV show and why you like it, it's what I did. Seeing how it is your favorite TV show, you should be able to explain why you like it in a short sentence really easy lol.
For pseudocode, I did something simple, here's basically what I did:
Set "variable name" as "My favorite show is "favorite show"."
Print "variable name"
Set "different variable name" as "I like this show because "reason you like the show"."
Print "different variable name"
And that was my pseudocode
List the different computer industries, and what they do.
(Like the part makers, people who assemble it and stuff not the companies)
Answer:
There are several different industries that are involved in the production and use of computers. These industries include:
Hardware manufacturers: These companies design and produce the physical components of computers, such as the motherboard, processor, memory, storage, and other peripherals.Software developers: These companies create the operating systems, applications, and other programs that run on computers.System integrators: These companies assemble and configure computers, often using components from multiple manufacturers, and sell them to consumers or businesses.Service providers: These companies provide support and maintenance services for computers, including repair, installation, and training.Data centers: These companies operate large facilities that host and manage the data and computing resources of other companies.Internet service providers: These companies provide access to the internet for businesses and consumers.Cloud computing providers: These companies offer computing services, such as storage, networking, and software, over the internet.Consulting firms: These companies provide advice and expertise on the use of computers and technology for business and organizational goals.Answer:
Hardware Manufacturers
Software Developers
System Integrators
Service Providers
Data Providers
ISP
Cloud Computing Providers
Consulting Firms
Explanation:
It is in order..
what are some basic commands to remember in terminal? windows 10
please help if you know
Answer:
If you just need a few, maybe this can help.
Explanation:
Cat - The cat command means 'Concatenate'. It prints the contents of a file or files to stdout. It's frequently used in Linux commands.
Touch - Using the 'Touch' command, you can create a file, or possibly just modify or generate a timestamp.
Move - The 'mv' command stands for 'Move'. As the name says, we can use this command to move files and directories from one place to another.
Chsh - The chsh command changes a user's login shell attribute. If you want to change the shell of another user, execute the command with root permissions.
Sudo - 'Sudo', or 'super user do', is a command that allows you to elevate your user privileges while executing the command to administrator privileges.
(I made this up teehee) what anime is katski bakugo from
20 points and brainliest please help
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:
1. Decide on the message you would like to display to the screen. Some ideas include:
1. Your favorite book title or TV show and why you like it
2. A few sentences sharing information about you
3. Your favorite sport and team or athlete
2. Use two variables to store your message.
Answer:
Main Module()
Declare String P1 = "The Fourth Closet"
Declare String P2 = "because it's about FNAF"
Do
Display P1
Display P2
End Module
Explanation:
You can put whatever in P1 and P2
Answer:
Explanation:
Insert your pseudocode here:
Begin Program
My name is Sophia, favorite book is “I found you” because the author had well described the book.
I was born on February 18th, 2008
Name my first variable (About me)
Name my second variable (Birth date)
Print my first variable (About me)
Print my second variable (Birth date)
End Program
(This is what I did}
Which word pairs are both principles of HCT?
O Web Design and Feedback
O TCP/IP and Visibility
O Network Engineering and Game Programming
O Reusability and Tolerance
Answer:
network engineering and game programming
Reusability and Tolerance are both principles of HCT, hence option D is correct.
What is HCT?
HCT stands for home and community-based therapy. This is actually a home-based behavioral health service for children and all families who are looking for a better treatment plan, one that is more sophisticated in comparison to emergency therapy.
This deals as far as the HCTs are concerned, they have received thorough training in a variety of therapy methods, including those that are related to cognitive science, and trauma-focused cognitive therapy.
However, some artistic talent and imagination are also needed, therefore you should be familiar with graphic design.
Therefore, the principles of HCT are reusability and tolerance., so option D is correct.
Learn more about HCT, here:
https://brainly.com/question/14871114
#SPJ2
HELP ME?!!?!?!?!?!?
This is for BIM class and its due before 11:59 central time <333
24. Which of the following areas in the PivotTable Field List task pane should you place numerical values to be summarized?
A. FILTERS
B. VALUES
C. ROWS
D. COLUMNS
25. Brian wants to apply a different chart style to his PivotChart. Which of the following PivotChart Tools tabs should be used?
A. Analyze
B. Format
C. Styles
D. Design
what is the answer i need them now pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls pls
Answer: Insert ribbon > table drop down menu
Explanation:
Answer:Insert ribbon > table drop down menu
Explanation:
Be sure to answer the following in complete and detailed sentences.
1. What might be a benefit of wirelessly connecting smart devices in a physical computing project?
2. How might you connect more than two micro:bits to activate multiple outputs triggered by one micro:bit?
3. How do batteries and other types of power sources make physical computing systems more mobile? Why is that helpful?
Answer: 1, 3
Explanation:
1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!
3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.
Answer:1: It can not just cause less of a wire mess. It can also cause easy travel if you want to do something from somewhere else!
3: It can make it easier to power up a device quickly when you CAN replace the batteries. It can also make charging more efficient overall.
Explanation:
How does a resident virus differ from a non-resident virus? !!!25 POINTS!!!!!
A) Resident viruses simply disrupt operations while non-resident viruses will control hosts.
B)Resident viruses will control hosts while non-resident viruses simply disrupt operations.
C)Resident viruses find networks to infect while non-resident viruses load themselves into memory.
D)esident viruses load themselves into memory while non-resident viruses find networks to infect.
Answer:
The correct answer is **D)** Resident viruses load themselves into memory while non-resident viruses find networks to infect. A resident virus is a type of computer virus that’s deployed and resides within a computer’s random access memory (RAM). A non-resident computer virus, on the other hand, is a type of computer virus that doesn’t reside within a computer’s RAM. Non-resident computer viruses can still be deployed within RAM, but they don’t stay there.
My feelings alwayss T-T
Answer:
my feelings always :/
Explanation:
Identify the error in the following block of code.
for x in range(2, 6):
print(x)
A. The first line is missing quotes.
B. The first line has a spelling error.
C. The second line has a spelling error.
D. The second line needs to be indented four spaces
Answer:
D.The second line needs to be indented four spaces
Explanation:
Since the print statement is not indented, it is not part of the for loop. This means that there are no lines of code to be executed in the for loop, so this will cause an error.
Which of the following scenarios falls into the category of network crimes?
A) listening in on someone’s private online conversation
B) stealing classified information from someone’s computer account
C) knowingly sending an email with malware
D) sending a hurtful message to a friend
Answer:
B
Explanation:
Hope it helps!
The options A, B, and C fall into the category of network crimes.
A) listening in on someone’s private online conversation
B) stealing classified information from someone’s computer account
C) knowingly sending an email with malware
The category of network crimes?A) When you secretly listen to someone's private online conversation, it is called eavesdropping or unauthorized interception of communication. This is considered a type of cybercrime. It is against the law in many places to listen to private conversations without permission.
B) Taking secret information from someone's computer account: This is a very serious crime called "hacking" or "sneaking into computer systems without permission. " Going into someone's computer account without permission to take important or secret information is against the law.
Read more about network crimes here:
https://brainly.com/question/31589991
#SPJ3