Which is a powerful computer that facilitates the whole network by providing variety of services to the computer or devices connected to the network?
A server
B Client
C PC
D LAPTOP ​

Answers

Answer 1

Answer:

server

Explanation:

it has ability to connect all computers to the network

Answer 2
A server

A server is a computer program or device that provides a service to another computer program and its user, also known as the client. In a data center, the physical computer that a server program runs on is also frequently referred to as a server.

Related Questions

Which is a correctly formatted Python tuple? [12, "circle", "square"] {"n":12, "shape1": "circle", "shape2": "square"} (12, "circle", "square") 12 circle square

Answers

Answer:

(12, "circle”, “square")  

Explanation:

Python is a computer programming language that is used to write programs. In the python programming language, the Tuple is a data type that can be defined inside a parentheses "()". It is of immutable kind which means the elements inside the parentheses cannot be changed once the elements are inserted inside the tuple. It is also defined by "()" or by predefined function, tuple().

In the context, the correct format of python tuple is : (12, "circle”, “square").

Answer:

(12, "circle”, “square")

Explanation:

       

what does the scalability of a data mining method refer to? its ability to predict the outcome of a previously unknown data set accurately its speed of computation and computational costs in using the mode its ability to construct a prediction model efficiently given a large amount of data its ability to overcome noisy data to make somewhat accurate predictions

Answers

A data mining method's scalability refers to its capacity to effectively build a prediction model in the face of a significant volume of data.

By data, what do you mean?

Data has the potential that has been transformed into a format that is useful for transfer or processing in computing. Data is information that has been transformed into binary visual file for use with modern computers and communication mediums.

What are types of data?

Data is the methodical recording of a specific amount. It is a series of representations of that quantity's various values. It is a compilation of data that will be utilized for a particular objective.

To know more about Data visit :

https://brainly.com/question/13650923

#SPJ4

You're developing a system for scheduling advising meetings with students in a Computer Science program. Each meeting should be scheduled when a student has completed 50% of their academic program. Each course at our university has at most one prerequisite that must be taken first. No two courses share a prerequisite. There is only one path through the program. Your task is to write code that takes a list of (prerequisite, course) pairs from standard input, separated by a space, and prints the name of the course that the student will be taking when they are halfway through their sequence of courses to standard output. In this case, the order of the courses in the program is: Software Design, Computer Networks, ComputerArchitecture, DataStructures, Algorithms, FoundationsOfCs, Operating Systems Example input DataStructures Algorithms Foundationsofcs OperatingSystems ComputerNetworks ComputerArchitecture Algorithms FoundationsOfCs ComputerArchitecture DataStructures SoftwareDesign ComputerNetworks Example output DataStructures In this case, the order of the courses in the program is: Software Design, Computer Networks, ComputerArchitecture, DataStructures, Algorithms, FoundationsOfCS, Operating Systems Example input DataStructures Algorithms Foundationsofcs OperatingSystems ComputerNetworks ComputerArchitecture Algorithms Foundationsofcs ComputerArchitecture DataStructures SoftwareDesign ComputerNetworks Example output DataStructures Clarifications • If a track has an even number of courses, and therefore has two "middle" courses, you should return the first one. • Each course will only have one course after it (except the final course). • There is always exactly one "start" and "end" course. • There are always at least two courses in the input. In JAVA

Answers

The task is to write a Java code that determines the course a student will be taking when they are halfway through their sequence of courses.

The input consists of prerequisite-course pairs, and the courses are connected in a linear path with no branches or loops. The code needs to identify the course that lies in the middle of the sequence based on the given input and print it as the output. To solve this problem, you can use a HashMap to store the prerequisite-course pairs. Iterate over the input pairs and build the HashMap where the key is the prerequisite and the value is the corresponding course. Then, starting from the initial course, traverse through the HashMap until the middle course is reached. This can be done by following the prerequisite chain until half of the total number of courses is traversed. Finally, print the name of the course in the middle position.

Learn more about HashMaps here:

https://brainly.com/question/30088845

#SPJ11

generalize your answer of 4(a) to comment on the optimal code for each character in this file, if the given file had ‘n’ distinct characters whose corresponding frequencies were represented by the first ‘n’ terms of the fibonacci series.

Answers

The Fibonacci series is a sequence of numbers where each number is the sum of the two preceding ones. So, if the frequencies of the characters in the file follow the Fibonacci series, the optimal code for each character can be determined as follows:

Start by assigning the most frequent character the shortest code. Assign longer codes to the less frequent characters in ascending order of their frequencies. Ensure that no code is a prefix of another code to avoid ambiguity.

This approach ensures that the most frequent characters are represented by shorter codes, reducing the average code length. It also guarantees that the code is uniquely decodable, as no code is a prefix of another. This is known as the "Huffman coding" technique.

To know more about  Fibonacci visit:-

https://brainly.com/question/32187206

#SPJ11

Studies have shown that is the most effective means to mobilize voters.
a. an email
b. a piece of direct mail
c. personal contact
d. a telephone call

Answers

Personal contact has been shown to be the most effective means to mobilize voters.

Studies have consistently found that face-to-face interactions, such as canvassing or door-to-door campaigning, have a significant impact on voter turnout. These personal contacts allow for direct communication, building trust, answering questions, and addressing concerns, which can be more persuasive and influential than other forms of communication. While other methods like email, direct mail, and telephone calls can still be effective in reaching voters and conveying information, they often lack the personal touch and direct interaction that personal contact provides.

Personal contact allows for a deeper level of engagement, enabling campaigners to establish a connection, understand individual concerns, and tailor their message accordingly. However, it's worth noting that the effectiveness of mobilization efforts can vary depending on the specific context, target audience, and campaign strategy. A combination of multiple communication methods, including personal contact, can be even more impactful in reaching and mobilizing a diverse range of voters.

Learn more about voter mobilization strategies here:

https://brainly.com/question/30647053

#SPJ11.

4. question 4 what is the largest perimeter of a shape made from the shapes in files dataset1.txt, dataset2.txt, dataset3.txt, dataset4.txt, dataset5.txt, and dataset6.txt (truncate your answer to two decimal places)?

Answers

The form will have a 30 perimeter. The greatest perimeter of a shape generated from shapes in files is 64.

What does 'truncate the data' mean?

By reallocating the data pages used to store the table data, TRUNCATE Database removes the data from the table and simply logs the page deallocations in the transaction log. Typically, fewer locks are employed. Each row in the table is locked for deletion when a row lock is used in the DELETE statement.

In programming, what does truncating mean?

Truncate, also known as prune or trim, is the process of shortening information by deleting material at the conclusion. Truncation may occur unintentionally or on purpose. To save memory or make the representation of a numerical value simpler, data may be purposefully shortened, for instance.

To know more about perimeter visit :-

https://brainly.com/question/26611855

#SPJ4

Which program will have the output shown below?

18
19
20


>>> for count in range(21):
print(count)
>>> for count in range(21):, , print(count)

>>> for count in range(18, 21):
print(count)
>>> for count in range(18, 21):, , print(count)

>>> for count in range(20):
print(count)
>>> for count in range(20):, , print(count)

>>> for count in range(18,20):
print(count)

Answers

The program will have the output shown below is >>> for count in range(18,20):  print(count)

What is meant by c++ programming ?

The object-oriented programming language C++, also known as C plus plus, was developed as a member of the C family of languages by renowned computer scientist Bjorne Stroustrop. In order to give programmers more granular control over memory and system resources, it was created as a cross-platform improvement to C.

C++ was developed as an extension of the C programming language and was originally known as "C with classes." C++ literally means to "increment C by 1," which reflects its origins. The majority of C programmes can be compiled using C++, despite having been renamed in 1983.

Portability. When using C++, users can run the same programme across various operating systems and user interfaces thanks to its portability or platform independence feature.

To learn more about C++ Programming refer to :  

https://brainly.com/question/13441075

#SPJ1

all erp systems are really data management systems that enable the user to look at organized data.

Answers

All ERP systems are indeed data management systems that facilitate the organization and manipulation of data. ERP stands for Enterprise Resource Planning, and these systems are designed to integrate and streamline various business processes within an organization.

One of the key functionalities of an ERP system is to store, manage, and provide access to vast amounts of data related to different aspects of the business, such as finance, inventory, sales, production, human resources, and more. The data is organized in a structured manner and made available through a centralized database.

By utilizing the ERP system's user interface and features, users can view, analyze, and manipulate the data in a more organized and efficient manner. They can generate reports, track performance indicators, make data-driven decisions, and gain insights into the overall operations of the organization.

However, it's important to note that ERP systems go beyond just data management. They also encompass functionalities like process automation, workflow management, collaboration, and integration of various business functions. ERP systems are designed to provide a comprehensive solution that not only manages data but also supports the overall management and optimization of business processes.

learn more about "organization":- https://brainly.com/question/19334871

#SPJ11

There is an extensive range of accounting/bookkeeping software available within Australia. In this instance you are to select th scurrently available within Australia and compare and evaluate them to determine their suitability for accounting client/s. Explain and justify your recommendation.

Answers

There are various accounting/bookkeeping software available within Australia, such as Xero, MYOB, QuickBooks, and Reckon One. Among these, Xero is the most popular accounting software in Australia due to its user-friendly interface, advanced features, and affordable pricing.

Xero has many features, including automated bank feeds, inventory management, fixed asset management, and multiple currency support. The software also provides real-time financial data to help business owners monitor their cash flow. Its cloud-based nature means that data is accessible from anywhere with internet access.MYOB is also a popular accounting software in Australia.

It offers many features, including automated bank feeds, payroll, inventory management, and time tracking. MYOB is easy to use, with a simple user interface. However, it is not as advanced as Xero, and it is more expensive. QuickBooks is a cloud-based accounting software that offers various features, including invoicing, payments, payroll, and inventory management. The software is user-friendly, with a simple interface. However, QuickBooks is not as advanced as Xero, and its pricing can be expensive. Reckon One is a cloud-based accounting software that offers many features, including invoicing, payments, and payroll. The software is easy to use and has a simple interface. However, Reckon One is not as advanced as Xero, and it lacks some features such as inventory management. In conclusion, Xero is the best accounting software in Australia due to its advanced features, affordable pricing, and user-friendly interface. It is suitable for small businesses, medium-sized businesses, and accountants.

Know  more about accounting/bookkeeping software here:

https://brainly.com/question/911682

#SPJ11

Mateo wants the words “It’s snowing!” to appear in the interpreter and typed print (It's snowing). This didn’t work. What needs to be added to the code?
quotation marks
a backslash
a period
a functional code

Answers

Answer:

print("It's snowing")

Explanation:

since it a string you need put quotation marks the code does not understand just (It's snowing) because it thinks it variable which it is not

A hard disk drive has 16 platters, 8192 cylinders, and 256 4kb sectors per track. The storage capacity of this disk drive is at most? 32 tb 128 gb 128 tb 32 gb

Answers

The storage capacity of this disk drive is at most 128 GB.

What is hard disk?An electro-mechanical data storage device known as a hard disc drive (HDD), hard disc, hard drive, or fixed disk stores and retrieves digital data utilising magnetic storage on one or more rigid quickly rotating platters coated with magnetic material. Data is accessible in a random-access fashion, which means that individual blocks of data can be saved and retrieved in any sequence. The platters are paired with magnetic heads, which are typically positioned on a moving actuator arm and read and write data to the platter surfaces. Modern HDDs are often in the shape of a compact rectangular box.HDDs are a sort of non-volatile storage because they keep stored data while powered off.What are the various types of hard discs?Hard disc drives (HDD), which employ one or more rotating discs and rely on magnetic storage, and solid-state drives (SSD), which have no moving mechanical elements but use flash memory similar to the kind found in USB flash drives, are the two main types of hard drives.

Learn more about hard disk here:

https://brainly.com/question/14504942

#SPJ4

Complete an internet search and summarize the first three (3)
"expert" opinions you find regarding: If the modern health care
reform (ACA) has been portrayed as a good or bad thing in the
media"

Answers

Opinions on the portrayal of the ACA in the media can vary significantly, and it's important to note that media perspectives may be influenced by various factors such as political bias and individual experiences. However, here are three general opinions that have been expressed:

Positive portrayal: Some experts argue that the ACA has been portrayed as a positive step towards improving access to healthcare, especially for underserved populations.

Negative portrayal: On the other hand, some experts criticize the media's portrayal of the ACA, stating that it has been depicted as a burdensome government intervention that increases healthcare costs and limits individual freedom.

Mixed portrayal: Another perspective is that the media's portrayal of the ACA is a mix of positive and negative coverage. This opinion suggests that the media has presented both success stories of individuals benefiting from the law as well as criticisms and challenges faced during its implementation.

Learn more about expert opinions on the portrayal of the ACA here:

https://brainly.com/question/29392704

#SPJ11

A measuring cylinder is used to measure the volume of an irregular
solid object.​

Answers

Answer:

Yes it is used for measuring the volume of irregular solid objects for example a peice of stone, rubber etc.

Explanation:

Create a program that:
Asks if you want to participate. If they type anything but y, yes, Yes, or YES, it repeats until they type y, yes, Yes, or
YES (While statement)
The program then asks three survey questions that you create. At least on of the questions must have a decision structure that takes a different path depending on the answer.
Lastly, the program prints a summary of the responses.

Answers

Consider a scenario where we want to create a program that can calculate the average of a set of (moredata[0]) allows us to accept "y", "yes", or "yeah" to continue the loop.

In Python, how do you repeat a program?

repeat() For practicing repeat in Python, the itertools package offers the repeat() function. We supply the data and the number of repetitions in the repeat() function.

How do you handle survey questions where respondents can choose from multiple answers?

Since no statistical software will be able to measure this unless you can divide it into two separate questions, which you shouldn't do, you should eliminate the response entirely. Make sure to let your participants know that each question should only have one response.

To know more about Python visit:-

https://brainly.com/question/18502436

#SPJ1

Searching for Venom !!

help me find him lol​

Answers

Answer:

Venom is widely distributed taxonomically, being found in both invertebrates and vertebrates; in aquatic and terrestrial animals; and among both predators and prey.

Explanation:

\( \red{hope \: u \: find \: venom \: asap}\)

Explanation:

\(are \: you \: searching \: for \: me \: \)

Which processes are single-threaded, and will improve performance with additional instances?

Answers

Processes that are single-threaded can only execute one task at a time, which means that adding additional instances can improve performance by enabling more tasks to be processed simultaneously.

Some examples of single-threaded processes that can benefit from additional instances include:

Web servers: A single-threaded web server can only handle one client request at a time. By running multiple instances of the web server, each instance can handle a separate request, thereby improving the server's overall throughput.

Data processing: When performing complex data processing tasks, such as analyzing large datasets or running simulations, adding additional instances can help divide the workload and reduce the time it takes to complete the task.

Image and video processing: Some image and video processing tasks, such as resizing or compressing large files, can be CPU-intensive and benefit from parallel processing across multiple instances.

Machine learning: Training large machine learning models can take a long time, and adding additional instances can speed up the training process by dividing the workload.

Database queries: Database queries can be computationally intensive, and running multiple instances of the query can help reduce the time it takes to return results.

Overall, any process that is single-threaded and CPU-bound can benefit from additional instances, as they can help distribute the workload and improve performance.

learn more about   single-threaded processes   here:

https://brainly.com/question/17031850

#SPJ11

when using a sandbox for determining malware vulnerabilities, your sandbox device should question 9 options: test all known operating system platforms for exploits be customized to resemble your network environment only analyze files with unknown extensions or prefixes contain known vulnerabilities for the malware to exploit

Answers

When using a sandbox for determining malware vulnerabilities, it is important to configure it to test all known operating system platforms, customize it to resemble your network environment, and prioritize the analysis of files with unknown extensions or prefixes.

When using a sandbox for determining malware vulnerabilities, the sandbox device should be configured to:

1. Test all known operating system platforms for exploits: The sandbox should support a wide range of operating systems to simulate real-world scenarios. This ensures that vulnerabilities specific to different platforms can be identified and analyzed.

2. Be customized to resemble your network environment: The sandbox should be set up to mimic the specific network environment where the malware might be encountered.

This includes replicating the network architecture, configurations, and security measures to accurately assess the impact and behavior of the malware in the actual environment.

3. Only analyze files with unknown extensions or prefixes: Focusing on files with unknown extensions or prefixes allows the sandbox to prioritize the analysis of potentially suspicious or malicious files.

This approach helps in detecting novel or evasive malware that may attempt to disguise itself by using unfamiliar file types.

4. Contain known vulnerabilities for the malware to exploit: The sandbox should be equipped with known vulnerabilities to evaluate the malware's behavior and exploitation techniques.

This allows security analysts to understand how the malware operates when targeting specific vulnerabilities and provides insights into potential weaknesses within the network.

By incorporating these features, the sandbox can effectively simulate real-world conditions, assess the behavior of malware, and identify vulnerabilities within the network environment. This aids in proactive threat detection, analysis, and strengthening of security measures to mitigate potential risks.

Learn more about sandbox:

https://brainly.com/question/30926112

#SPJ11

In which type of computer, data are represented as discrete signals?

Answers

Answer:

Digital computer.

Explanation:

A digital signal is a type of continuous signal (discrete signal) consisting of just two states, on (1) or off (0).

To show that a language is NOT decidable, one could:
A. reduce an undecidable language to it.
B. show that it is not recognizable
C. use the Church-Turing thesis.
D. ask 1000 people to write a program for it and find out that none of them can.
E. reduce it to an undecidable language.

Answers

The options A, B, and E are the approaches commonly used to demonstrate that a language is not decidable.

A. reduce an undecidable language to it.

B. show that it is not recognizable

E. reduce it to an undecidable language.

What is the language?

To show non-decidability of a language, one could:

A. Reduce undecidable language to to confirm it's complex. Thus, language must be undecidable.  Prove is unrecognizable - no algorithm or Turing machine can accept valid instances and halt on invalid ones.

Undecidable languages cannot be determined by algorithms or Turing machines.   options A, B, and E commonly prove a language is undecidable.

Learn more about   undecidable language  from

https://brainly.com/question/30186717

#SPJ4

Describing Label Printing Options
What are some options when printing labels? Check all that apply.
random addresses
single label
handwritten label
full page of same label

Answers

Custom labels are printed using a variety of techniques in the label printing process. Some options when printing labels are Single label and Full page of same label.

What Is Label Printing?

Label printing is the process of creating personalized labels using different techniques. These techniques include wide-format printing, flexographic printing, and digital printing, all of which have an impact on how the label looks, feels, and serves its purpose.

Label Printing Today:

Flexographic printing has continued to advance and prosper up until the 1990s, when digital printing emerged as a brand-new method for producing labels. With the addition of inkjet technology, this process has advanced today, producing premium, full-color labels with a less time-consuming procedure and less waste.

To know more about Label Printing, visit: https://brainly.com/question/4676056

#SPJ9

The short-range two-way communication technology behind contactless payments is called ____.

Answers

Hi there,

I hope you and your family are staying safe and healthy!

The answer is: Near Field Communication (NFC).

The short-range two-way communication technology behind contactless payments is called the Near Field Communication (NFC).

Happy to help!

~Garebear

Sort short_names in reverse alphabetic order.
Sample output with input: 'Jan Sam Ann Joe Tod'
['Tod', 'Sam', 'Joe', 'Jan', 'Ann']
(explain step by step)

Answers

To sort the list of short names in reverse alphabetical order, you can follow these steps:

Step 1: Split the input string into a list of short names.

Given input: 'Jan Sam Ann Joe Tod'

Split into a list: ['Jan', 'Sam', 'Ann', 'Joe', 'Tod']

Step 2: Sort the list in alphabetical order.

Sorted list: ['Ann', 'Jan', 'Joe', 'Sam', 'Tod']

Step 3: Reverse the sorted list.

Reversed list: ['Tod', 'Sam', 'Joe', 'Jan', 'Ann']

So, the final output with the given input 'Jan Sam Ann Joe Tod' is ['Tod', 'Sam', 'Joe', 'Jan', 'Ann'].

The names are first sorted in alphabetical order, and then the sorted list is reversed to obtain the names in reverse alphabetical order.

Learn more about list here:

https://brainly.com/question/32132186

#SPJ11

Design a cake for your birthday!
Draw a cake on the screen. Ask the user how old they are and then draw that many candles on the cake!

Hints:
Use constants to control the size of your cake so that if one value changes, the cake is still proportional
Make sure your candles are added to the cake from the center rather than adding them from the left or right
There are many different ways to decorate your cake, but using loops will make adding lots of decorations much easier!

Answers

The algorithm that is used to design a cake for your birthday is given as:


The Algorithm

Define constants for the size of the cake, such as cake_width and cake_height.

Display a blank canvas for drawing.

Prompt the user to enter their age.

Read the user's input and store it as age.

Calculate the x-coordinate for the center of the cake using the formula: center_x = cake_width // 2.

Draw the cake on the canvas using appropriate ASCII characters and the defined constants.

Use a loop to draw age number of candles on the cake, starting from center_x and moving both left and right.

Display the final cake with candles on the screen.


Read more about algorithm here:

https://brainly.com/question/13902805

#SPJ1

What might you see by turning a surface model to a certain angle? *


PLEASE HELP!!! THANK U SO MUCH! GOD BLESS!

What might you see by turning a surface model to a certain angle? *PLEASE HELP!!! THANK U SO MUCH! GOD

Answers

Answer:

Turning a surface model to a certain angle can control whether or not you it can go right or left :)

Explanation:

Please help w/ Java, ASAP!!!!

Please help w/ Java, ASAP!!!!
Please help w/ Java, ASAP!!!!

Answers

Answer:

B

Explanation:

When you have a method that is copying values from one array into another, you first have to initialize a new array which you can copy the values into. This is done by using the provided value "count".

   int [ ] nums = new int [count];

Second, you have a "for each" loop that iterates over each index in the first array, and assigns the value at that index to the same index location in the copy array. In a "for each" loop, the variable "val" represents the content of an index, not an iterated value itself. This is why we can just do this inside the loop:

  nums[ j ] = val;

That said, you still need "j" to be there and increment because we still need a tracking value for the current index in the copy array.

   int j = 0;

   for (int val: array)

   {

     copyArray[j] = val;

    j++;

   }

Third, you return the copy version of the array.

return nums;

Source:

I am currently a second year Java student.

________ software helps run the computer and coordinates instructions between other software and the hardware devices.

Answers

System software assists in the operation of the computer and coordinates instructions between other software and hardware devices.

What is System software?

System software is a type of software that manages and controls the hardware resources of a computer system. It acts as an intermediary between the user and the computer hardware, allowing applications to run properly and efficiently.

Examples of system software include operating systems, device drivers, firmware, and utility programs. Operating systems are the most common type of system software, and they provide a user-friendly interface for interacting with the computer.

Device drivers are used to communicate with hardware devices, such as printers or graphics cards, while firmware is software that is embedded in hardware devices to control their behavior. Utility programs are used to perform specific tasks, such as disk cleanup or virus scanning.

To learn more about System software, visit: https://brainly.com/question/24321656

#SPJ4

Which of the following actions typically involves the use of 802.1x authentication? (Select two.)
- Authenticating remote access clients
- Authenticating VPN users through the internet
- Controlling access through a router
- Controlling access through a wireless access point
- Controlling access through a switch

Answers

The two actions that typically involve 802.1x authentication are:

1. Controlling access through a wireless access point
2. Controlling access through a switch
802.1x authentication is commonly used to control access in these scenarios by validating user credentials and allowing or denying access accordingly.

1. Controlling access through a wireless access point:

When using a wireless access point, 802.1x authentication is employed to secure the network and control who can connect to it.The wireless access point acts as the entry point to the network, and 802.1x authentication is used to verify the identity of users before granting them access.When a user attempts to connect to the wireless network, they are prompted to provide their credentials, such as a username and password.The access point then forwards these credentials to an authentication server, which verifies the user's identity.If the credentials are valid, the access point allows the user to connect to the network. Otherwise, access is denied.

2. Controlling access through a switch:

In a wired network environment, controlling access through a switch involves the use of 802.1x authentication.The switch acts as a central point for connecting multiple devices, such as computers, servers, or other networking equipment.By implementing 802.1x authentication on the switch, only authenticated devices are allowed to connect to the network through the switch ports.When a device is connected to a switch port, it must undergo the 802.1x authentication process.The device sends its credentials to an authentication server, which verifies the credentials and determines whether the device should be granted network access.If the device is successfully authenticated, the switch allows it to communicate on the network. If authentication fails, access is denied.

Learn more about 802.1x authentication:

https://brainly.com/question/30244267

#SPJ11

Does anyone do scratch? (Its a coding website)

Answers

Answer:

heck yeah i do

Explanation:

Raul is a 13-year-old teenager interested in taking up photography as a new hobby. His dad wants to buy him a camera for his birthday that will be easy to use and simple enough for a beginner, meaning that Raul won’t have to mess with any settings if he doesn’t want to. What type of camera might be a good starter camera for his teen aged son?

a. point and shoot
b. hybrid
c. DSLR
d. format field camera

Answers

Answer:

c. DSLR can be good camera for the teenager son or any beginner photographer

Answer:

Point and shoot

Explanation:

With a point and shoot camera, all you literally do is point and shoot. It is a very simple camera with no buttons and the lens don't move. Is it the perfect camera for a beginner.

comment suprimer son compte brainly

Answers

L'option de suppression de votre compte se trouve dans les Paramètres de votre Profil, sous la rubrique Privé. De là, vous devrez cliquer sur la case intitulée Je veux supprimer mon compte, et la demande de suppression sera envoyée
Other Questions
help in spanish plz:) A separatory funnel contains ethyl acetate and an aqueous solution of some kind. What comprises the bottom layer?. how many times larger in diameter of the smallest jovian planet than the diameter of the largest terrestrial planet Let W be the subspace of R that consists of all vectors of the form (a, -7a), where a is a real number. Find W, the orthogonal complement of W. (Hint: think about a straight line that is perpendicular to the line y -7x at the origin) 4Ms. Thorson bought a piece of lace that was 3 feet long. She cuts off as many pieces as possible that are 9 inches long. Will Ms. Thorson have any lace left over? Show and explain your work. Tanya Drove 3 1/2 hours and used 1/3 tank of gas. For how long could Tanya drive using 1/2 tank of gas?write you answer as a simplified mixed number a. How many rolls should Yellow Press order at a time? Yellow Press should order rolls at a time. (Enter your response rounded to the nearest whole number.) b. What is the time between orders? (Assume 200 workdays per year.) The time between orders is days. (Enter your response rounded to one decimal place.) What two principles of the Weimar constitution contributed to the rise of the Nazi Party? How do these two principles connect? (100 POINTS AND WILL MARK BRAINLIEST!!!) What is the species name for pezizales What is 2 - 1/8 as an improper fraction If Nominal GDP is $22,000 billion and the GDP deflator is 110, then Real GDP is ________.A) $24,200 billionB) $11,000 billionC) $20,000 billion What was the United States response to the Zimmerman telegram? 1. The height (feet) of a projectile x seconds after it is launched straight up in the air is given by f(x)=16x^2+458x+5. Find the velocity of the ball when it strikes the ground. 2.A company's demand and cost functions are given by p(q)=0.05q+525 and C(q)=0.01q^37q^2+85q. What is the company's profit when marginal revenue is $450 per item? How to find duplicate elements in array in java using HashMap? ransactions:1. Tran Lee invested $15,000 cash in the business.2. Paid $750 rent for the month.3. Purchased sewing equipment for $1,750.4. Purchased sewing supplies, $250, on account from Eastern Notions Company.5. Received $189 for alterations.6. Completed a large tailoring job and received $1,149 for services.7. Tran Lee withdrew $200 for personal use.8. Did tailoring work on account for $256.9. Paid $150 on account owed to Eastern Notions Company.(1) Prepare a T account for each account used by Lee's Tailoring Service.(2) Analyze each transaction and record the transaction in the appropriate T accounts.(3) After recording all the transactions, compute the balance of each account. Indicate the normalbalance by writing "Balance" on the normal balance side of the account.(4) Test the equality of debits and credits.(Record the transactions in the given order. Be sure to list the assets, liabilities and owner's equity in order of their liquidity. Omit the "$" sign in your response.)General LedgerCash in Bank(1)$ 15,000(2)$ 750(5)189(3)1,750(6)1,149(7)200(9)150 Balance $ 13,488Accounts Receivable(8)$ 256 Balance $ 256Sewing Supplies(4)$ 250 Balance $ 250Sewing Equipment(3)$ 1,750 Balance $ 1,750Accounts Payable(9)$ 150(4)$ 250 Balance $ 100Tran Lee, Capital(1)$ 15,000 Balance $ 15,000Tran Lee, Withdrawals(7)$ 200 Balance $ 200Tailoring Fees(5)$ 189(6)1,149(8)256 Balance $ 1,594Rent Expense(2)$ 750 Balance $ 750Account Name Debit CreditCash in Bank$ 13,488Accounts Receivable$256Sewing Supplies$250Sewing Equipment$1,750Accounts Payable$100Rent Expense750 $ 30,338Cash in Bank $ $13,488Accounts Payable$100Tran Lee, Capital$15,000 $ 28,5882020 McGraw-Hill Education. All rights reserved. Create an acronym using the word IGNEOUS. manuel velasquez claims that the corporate internal decision structure of a corporation shows that a corporation can have both intentions and intentionality. true or false a. a cost is something used up to produce revenues in a particular accounting period. b. variable costs are direct costs; only fixed costs are indirect costs. c. the cost of direct materials is fixed per unit but variable in total. Pls help me hurry ill give brainest 1. How do we best describe strategy. 2. Define competitive advantage and explain its relationship to economic value creation.