Answers

Answer 1

Answer:ty

Explanation:

Answer 2
Ty tysm u angel u amazing human angel

Related Questions

Can someone help me explain Nvm scheduling in operating systems?

Answers

Low-power and short-latency memory access is critical to the performance of chip multiprocessor (CMP) system devices, especially to bridge the performance gap between memory and CPU

camera mount that is worn over the shoulders of a camera operator. What is it called?

Answers

It is called a camera stabilizer.
I hope this helped :)

The capability of moving a completed programming solution easily from one type of computer to another is known as ________. Group of answer choices

Answers

Answer: Portability

Explanation: I hope it helps you!

True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.

Answers

The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.

There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.

The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.

It uses the client–server model architecture via different control and data connections between the client and the server.

Learn more from

https://brainly.com/question/20602197

What's computer hardware ​

Answers

the physical components that a computer system requires to function

hope it helps

Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

What type of database replication relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy

Answers

Database replication is very common in this Era. Traditional database replication is relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy.

Database replication  is known to be the constant electronic copying of data from a database using one computer or server that is connected also to a database in another . this ensure that all users do share the same level of information.

Replication is often done to technologies which are used for copying and distributing data and database objects from one database to another and thereafter use in synchronizing between databases.

Conclusively, Replicas can only be made in the Traditional database replication through the power of centralized control.

See full question below

What type of database replication relies on centralized control that determines when replicas may be created and how they are synchronized with the master copy?

a distributed database model

b. traditional database replication

c. enterprise replication

d. local database model

Learn more about database replication from

https://brainly.com/question/6447559

What does “The Principle of Least Privilege” mean as applied to security?

Answers

Answer:

The principle of least privilege (PoLP) refers to an information security concept in which a user is given the minimum levels of access – or permissions – needed to perform his/her job functions. ... Least privilege enforcement ensures the non-human tool has the requisite access needed – and nothing more.

Explanation: let me know if this helps!

3 3) Why computer is called non-inteligent , IN Dull machine?

Answers

Answer:

Computers are dull: The CPU is the Central Processing Unit or the brains of the computer. The CPU knows what to do with machine language instructions. It doesn't understand them; it just knows what to do with them.

Explanation:

Hope I could help.

                                 please mark as brainliest

Natural language generation is focused on?

Answers

While natural language understanding focuses on computer reading comprehension, natural language generation enables computers to write. NLG is the process of producing a human language text response based on some data input. This text can also be converted into a speech format through text-to-speech services.

- BRAINLIEST answerer

Sebutkan contoh komputer analog, komputer digital, dan komputer hybrid

Answers

Answer: the examples of analog computer is voltmeter

Example of digital computer is tablet,mobile etc

Example of hybrid computer is digital meters used nowadays in cars etc

Develop an algorithm and draw a flowchart to determine and input number is palindrome or not.​

Answers


function checkPalindrome(str){
let reversed = str.split("").reverse().join("")
return str === reversed
}
let str1 = "anna"
let str2 = "banana"
let str3 = "kayak"
checkPalindrome(str1)
// -> true
checkPalindrome(str2)
// -> false
checkPalindrome(str3)
// -> true

discuss the communicatin process giving detailed explanation on each process​

Answers

Communications is fundamental to the existence and survival of humans as well as to an organization. It is a process of creating and sharing ideas, information, views, facts, feelings, etc. among the people to reach a common understanding. Communication is the key to the Directing function of management.

A manager may be highly qualified and skilled but if he does not possess good communication skills, all his ability becomes irrelevant. A manager must communicate his directions effectively to the subordinates to get the work done from them properly.

Communications Process

Communications is a continuous process which mainly involves three elements viz. sender, message, and receiver. The elements involved in the communication process are explained below in detail:

1. Sender

The sender or the communicator generates the message and conveys it to the receiver. He is the source and the one who starts the communication

2. Message

It is the idea, information, view, fact, feeling, etc. that is generated by the sender and is then intended to be communicated further.

Browse more Topics under Directing

Introduction, Meaning, Importance & Principles of DirectingElements of DirectionIncentivesLeadership

3. Encoding

The message generated by the sender is encoded symbolically such as in the form of words, pictures, gestures, etc. before it is being conveyed.

4. Media

It is the manner in which the encoded message is transmitted. The message may be transmitted orally or in writing. The medium of communication includes telephone, internet, post, fax, e-mail, etc. The choice of medium is decided by the sender.

5. Decoding

It is the process of converting the symbols encoded by the sender. After decoding the message is received by the receiver.

6. Receiver

He is the person who is last in the chain and for whom the message was sent by the sender. Once the receiver receives the message and understands it in proper perspective and acts according to the message, only then the purpose of communication is successful.

7. Feedback

Once the receiver confirms to the sender that he has received the message and understood it, the process of communication is complete.

8. Noise

It refers to any obstruction that is caused by the sender, message or receiver during the process of communication. For example, bad telephone connection, faulty encoding, faulty decoding, inattentive receiver, poor understanding of message due to prejudice or inappropriate gestures, etc.

#include
void main()
{
int m=45,first,last;
first=m/10;
last=m%10;
printf("%d",first);//line 1
printf("\n%d",last);//line 2
printf("\nSum=%d",first*last);//line 3
printf("\n%d",first*last);//line 4
printf("\n%d",last*last);//line 5
printf("\nCube=%d",first*first*first);//line 6
}


Select the correct output for line 1 ~
1 point
4
5
0

Answers

Answer:

4

Explanation:

45 divided by 10 using integer division is 4

I ran the program, output is below.

Write a function named partfthat takes inas parameterstwo parallel lists: a list of times (in increasing order), and a list of distance traveled by that point in time. The function should return a new list giving the average velocity between consecutive time measurements. The new list should have a length of one less than the original lists.

Answers

The program calculates the velocity between points in a list is written below. The program is written in python 3 thus ;

t = input("Enter time values : ")

#Enter the time values of the data

p = input("Enter distance values : ")

#Enter the distance values

dist = [float(x) for x in p.split()]

time = [float(x) for x in t.split()]

#pyt then values in a list

def partfthat(dist, time):

#initialize function that takes in two parameters

vel = []

#empty list to hold the calculated velocity values

i = 0

#indexer

while i <= len(dist)-2:

#while loop to iterate

v = (dist[i+1] - dist[i]) / (time[i+1] -time[i])

#Use the velocity formula

vel.append(v)

#append values to the empty list created

i+=1

return vel

print(avg_vel(dist, time))

A sample run of the program is attached.

Learn more : https://brainly.com/question/25681441

Do you have any concerns or worries about how you will manage your course assignments or expectations? Your journal entry will only be seen by you and your instructor, so feel free to share any questions and worries you have.

Answers

Answer:

no worries at all.

yeah-ya..... right?

30th Nov 2020. Difference between Data and Information

Answers

Answer:

Data is a collection of unstructured or unorganized facts and figures.

Information is a collection of processed data.

Hope it helps...............

Sarah was recently reviewing all the photos that she has saved on her computer and was shocked to find that she has over 10,000 images. Thankfully, digital photography will allow her to rearrange, organize, and easily search within her photos. What types of tasks are these?

A.
image evolution

B.
image formatting

C.
image editing

D.
image management

Answers

Answer:

D

Explanation:

image management

The type of task that allows Sarah to rearrange, organize, and easily search within her photos is known as Image management. Thus, the correct option for this question is D.

What do you mean by image management?

Image management may be characterized as a type of feature that allows a user to store, organize, centralize, and distribute digital images, assets, and graphics that are automatically saved in the computer. It also evaluates and enhances your image with respect to the perception of others.

According to the context of this question, image formatting nay deals with the file formatting for a digital image such as JPEG, PNG, GIF, etc. Image editing encompasses the process and strategy of acquiring alteration in the image with respect to a user.

Therefore, image management is the task that allows Sarah to rearrange, organize, and easily search within her photos. Thus, the correct option for this question is D.

To learn more about Image management, refer to the link:

https://brainly.com/question/19263329

#SPJ2

Given a variable that contains mixed collection types, update the provided function to display the first inital and last name of the instructor:

Update the function to accept a list and the name of the instructor you wish to find.
Update the function to reformat the name of the instructor and return it back to the calling program.
If the instructors name is entered as John Smith then the function should return back J. Smith
If the instructors name is entered as Tracy Anne Rios then the function should return back T. Rios
If the instructors name is entered as Jackson then the function should return back Jackson
Add in any exception handling for the following scenarios:
Exceptions related to accessing the list or dictionary should output the message: Instructor not found.
All other exceptions should output the message: An error has occurred.
Test to ensure the program passes the provided test cases found in the TESTS.md file
Hints
You may only use a try/except block, no if statements
Figure out how to use only one return in the method

Tests.md:
Input

Amy Williams
Output

A. Williams
Case 2
Input

Sarah Jane Smith
Output

S. Smith
Case 3
Input

Thomas Tom
Output

Instructor not found.

What i have so far
#!/usr/bin/env python3
# Discussion 10.2: Collection Type Exceptions

# Task 1. Modify Functions for Names
def get_initial_name(initials, name):
list = instructor_name.split(' ') # this function returns a list
try:
initial = list[0][0]
name = list[-1]
f_name = initial + '. ' + name
except:
return 'Instructor not found'

# DO NOT MODIFY BELOW
if __name__ == "__main__":

courses = [
{ "name": "Amy Andrews", "courseName": "Math I", "units": 3 },
{ "name": "Bryan Bravo", "courseName": "English I", "units": 3},
{ "name": "Charles Chavez", "courseName": "Physics I", "units": 3 },
{ "name": "Daniel Diaz", "courseName": "Chemistry I", "units": 3 },
{ "name": "Edgar Allen Elam", "courseName": "Math II", "units": 3 },
{ "name": "Felicia Farr", "courseName": "Music I", "units": 3 },
{ "name": "GarthGarcia", "courseName": "Physical Education I", "units": 3 }
]

# Take Input
instructor_name = input("> ")

# Output the Result
print(get_initial_name(courses, instructor_name))

Answers

Given an independent variable it dependent variable of cobtriallex vainest update the function of reformat the name of the insurance company

In order to send and receive packets in the Internet, hosts require an IP address. What are the 2 ways a host can obtain an IP address

Answers

Answer:

Explanation:

An IP address is a 32-bit number. It uniquely identifies a host (computer or other device, such as a printer or router) on a TCP/IP network.

IP addresses are normally expressed in dotted-decimal format, with four numbers separated by periods, such as 192.168.123.132. To understand how subnet masks are used to distinguish between hosts, networks, and subnetworks, examine an IP address in binary notation.

For example, the dotted-decimal IP address 192.168.123.132 is (in binary notation) the 32-bit number 110000000101000111101110000100. This number may be hard to make sense of, so divide it into four parts of eight binary digits.

These 8-bit sections are known as octets. The example IP address, then, becomes 11000000.10101000.01111011.10000100. This number only makes a little more sense, so for most uses, convert the binary address into dotted-decimal format (192.168.123.132). The decimal numbers separated by periods are the octets converted from binary to decimal notation.

For a TCP/IP wide area network (WAN) to work efficiently as a collection of networks, the routers that pass packets of data between networks don't know the exact location of a host for which a packet of information is destined. Routers only know what network the host is a member of and use information stored in their route table to determine how to get the packet to the destination host's network. After the packet is delivered to the destination's network, the packet is delivered to the appropriate host.

For this process to work, an IP address has two parts. The first part of an IP address is used as a network address, the last part as a host address. If you take the example 192.168.123.132 and divide it into these two parts, you get 192.168.123. Network .132 Host or 192.168.123.0 - network address. 0.0.0.132 - host address.

The second item, which is required for TCP/IP to work, is the subnet mask. The subnet mask is used by the TCP/IP protocol to determine whether a host is on the local subnet or on a remote network.

In TCP/IP, the parts of the IP address that are used as the network and host addresses aren't fixed. Unless you have more information, the network and host addresses above can't be determined. This information is supplied in another 32-bit number called a subnet mask. The subnet mask is 255.255.255.0 in this example. It isn't obvious what this number means unless you know 255 in binary notation equals 11111111. So, the subnet mask is 11111111.11111111.11111111.00000000.

Lining up the IP address and the subnet mask together, the network, and host portions of the address can be separated:

11000000.10101000.01111011.10000100 - IP address (192.168.123.132)

11111111.11111111.11111111.00000000 - Subnet mask (255.255.255.0)

The first 24 bits (the number of ones in the subnet mask) are identified as the network address. The last 8 bits (the number of remaining zeros in the subnet mask) are identified as the host address. It gives you the following addresses:

11000000.10101000.01111011.00000000 - Network address (192.168.123.0)

00000000.00000000.00000000.10000100 - Host address (000.000.000.132)

So now you know, for this example using a 255.255.255.0 subnet mask, that the network ID is 192.168.123.0, and the host address is 0.0.0.132. When a packet arrives on the 192.168.123.0 subnet (from the local subnet or a remote network), and it has a destination address of 192.168.123.132, your computer will receive it from the network and process it.

Almost all decimal subnet masks convert to binary numbers that are all ones on the left and all zeros on the right. Some other common subnet masks are:

Decimal Binary 255.255.255.192 1111111.11111111.1111111.11000000 255.255.255.224 1111111.11111111.1111111.11100000

Internet RFC 1878 (available from InterNIC-Public Information Regarding Internet Domain Name Registration Services) describes the valid subnets and subnet masks that can be used on TCP/IP networks.

Hope this helps!

If there are over 1,000 websites about a certain topic, the information is reliable. A. True B. False

Answers

Answer:

If they all have the same answer it is true, but if they are all different check with trusted sources

Explanation:

Write a recursive function called DigitCount() that takes a positive integer as a parameter and returns the number of digits in the integer. Hint: The number of digits increases by 1 whenever the input number is divided by 10. Ex: If the input is:

Answers

Recursive functions are functions that are called from within itself

The recursive function DigitCount() in Python where comments are used to explain each line is as follows:

#This defines the function

def countDigits(n):

   #If the integer is less than 10

   if n< 10:

       #Then the integer has 1 digit

       return 1

   #Otherwise,  

   else:

       #Count the number of integers

       return 1 + countDigits(n / 10)

At the end of the function, the count of integers is returned to the main function

Read more about similar programs at:

https://brainly.com/question/20397067

Write a function remove_duplicates that removes duplicates from an array. For example, if remove_duplicates is called with an array containing 1, 4, 9, 16, 9, 7, 4, 9, 11 … then the array is changed to 1, 16, 7, 4, 9. 11. Your function should have a reference parameter for the array size that is updated when removing the duplicates

Answers

The function is an illustration of loops

Loops are used to perform repetitive operations

The function in Java where comments are used to explain each line is as follows:

//This defines the remove_duplicates function

public static int remove_duplicates(int arr[], int n){

 //If the length of the array is 0 or 1, then return the original array

 if (n == 0 || n == 1) {

  return n;

 }

 //This creates a new array

 int[] newArr = new int[n];

 

 //This initializes the index of the array to 0

 int ind = 0;

 //This iterates through the original array

 for (int i = 0; i < n - 1; i++) {

     //The following loop populates the new array with the unique elements of the original array

  if (arr[i] != arr[i + 1]) {

   newArr[ind++] = arr[i];

  }

 }

 newArr[ind++] = arr[n - 1];

 // The following loop changes the original array

 for (int i = 0; i < ind; i++) {

  arr[i] = newArr[i];

 }

 return ind;

}

At the end of the function, the duplicate elements of the array are removed

Read more about similar programs at:

https://brainly.com/question/22552591

What symbol must go at the end of an if statement?

Answers

::::::::
a period (.)

Answer: the pireod .

Explanation:

I love dogs & cats.

When you create a _____ query, the value the user enters in the dialog box determines which records the query displays in the results. a. parameter

Answers

When a parameter query is created, the value entered in a dialog box by an end user determines the record that would be displayed in the results.

A query refers to a computational request for data (information) that are saved either in a database table, from existing queries, or from a combination of both a database table and existing queries.

Basically, there are four (4) main types of query and these include:

Select query.Action query.Aggregate query.Parameter query.

A parameter query is designed and developed to display a dialog box that prompts an end user for data or field criteria, which determines the record that would be displayed in the results.

Read more: https://brainly.com/question/23388493

Queries are questions true or false?

Answers

Answer:

true

Explanation:

in the dictionary they mean the same thing

A programmer will typically write a(n) _____ and pass it to the interpreter. Group of answer choices object method variable script

Answers

Answer:

Script

Explanation:

A set of code blocks which is written to solve a particular problem in a certain programming language and passed to the interpreter to run is called a script.

The script is program's body which is made up of codes written in accordance to the syntax of a certain programming language.

In other to execute the program written, it has to be passed to the interpreter, which run the script and produces an output.

Hence, the set of code written by a programmer is called the script.

Learn more :https://brainly.com/question/14364607

Big Chungus is god. prove me wrong.

Answers

Answer:

who is Big chungus???

Believe in Lord Buddha !

Create a procedure named STATUS_SHIP_SP that allows an employee in the Brewbeans' Shipping Department to update an order status to add shipping information. The BB_BASKETSTATUS table lists events for each order so that a shopper can see the status, date, and comments as each stage of the order process is finished. The IDSTAGE column of the BB_BASKETSTATUS table identifies each stage; the value 3 in this column indicates that an order has been shipped. The procedure should allow adding a row with an IDSTAGE of 3, date shipped, tracking number and shipper. The BB_STATUS_SEQ sequence is used to provide a value for the primary key column. Test the procedure with the following information: o Basket # = 3 o Date shipped = 20-FEB-12 o Shipper = UPS o Tracking # = ZW2384YXK4957

Answers

Answer:

c

Explanation:

A procedure named STATUS_SHIP_SP that allows an employee in the Brewbeans' Shipping Department to update an order status to add shipping information is in the explanation part below.

A representative from Brewbeans' shipping division can change an order's status and add shipment details by using the PL/SQL method STATUS_SHIP_SP, as shown in the following example:

CREATE OR REPLACE PROCEDURE STATUS_SHIP_SP (

   p_basket_number   IN  NUMBER,

   p_date_shipped    IN  DATE,

   p_shipper         IN  VARCHAR2,

   p_tracking_number IN  VARCHAR2

)

IS

   v_status_id   NUMBER;

BEGIN

   -- Get the next value from the BB_STATUS_SEQ sequence

   SELECT BB_STATUS_SEQ.NEXTVAL INTO v_status_id FROM DUAL;

   

   -- Insert a new row into the BB_BASKETSTATUS table

   INSERT INTO BB_BASKETSTATUS (STATUSID, BASKETNO, IDSTAGE, STATUSDATE, COMMENTS)

   VALUES (v_status_id, p_basket_number, 3, p_date_shipped, 'Shipped: ' || p_shipper || ', Tracking Number: ' || p_tracking_number);

   

   -- Commit the transaction

   COMMIT;

   

   -- Display a success message

   DBMS_OUTPUT.PUT_LINE('Order status updated. Shipment information added.');

EXCEPTION

   WHEN OTHERS THEN

       -- Display an error message

       DBMS_OUTPUT.PUT_LINE('Error: Unable to update order status.');

       -- Rollback the transaction

       ROLLBACK;

END;

/

Thus, by doing this, the procedure will be called with the specified parameters, and if successful, a new entry with the proper shipping information for basket number 3 will be added to the BB_BASKETSTATUS database.

For more details regarding SQL, visit:

https://brainly.com/question/34315524

#SPJ6

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists

Answers

Answer:

ICMP

Explanation:

What is the best data type for traveling day?

Answers

here if its wrong sorry
Other Questions
Fill in the blanks with suitable countable/uncountable noun as indicated in the brackets. a. ________________ begins at home. (uncountable noun)b.There is no point crying over the spilt _________________. (uncountable noun)c. ________________of a feather flock together. ( countable noun)d. All that glitters is not .............. (uncountable nuon) Naomi reads 9 pages in 27 minutes, 12 pages in 36 minutes, 15 pages in 45 minutes, and 50 pages in 150 minutes Help help help help English What is the inverse of the following statement: If x is a whole number, then x = 5?If x is not a whole number, then x 5.If x = 5, then x is a whole number.If x 5, then x is not a whole number.If x is not a whole number, then x = 5. What is the location of F on the decimal number line below?Write your answer as a decimal.6.76.86.9II? Which statement best describes the relationship between the stock market and herd behavior?Group of answer choicesHerd behavior contributes to stock market changes because it compels stockbrokers to act on emotion rather than reason.Stock market employees work in a constant state of anxiety, much like herd animals.Stock market bubbles and crashes are sometimes caused by herd behavior but are most often caused by fear.Both herd behavior and the stock market are motivated mainly by greed, which prevents people from using logic and reason. The ___________ is the longest river in Europe. In what ways does Hildegard's plainchant reflect her attitudes about the nature of faith? If the perimeter of an isosceles triangle is21cm. Find the product of the other two side if the base side is 9cm beth is buying 3 pounds of chicken thighs for 1.29 per pound. how much will she pay The end of law is not to abolish or restrain, but to preserve and enlarge freedom. For in all the states of created beings, capable of laws, where there is no law there is no freedom.The quotation supports Lockes belief inthe need for absolute rule to keep people in control.the social contract between people and government.the need to keep the church separate from the state.the desire for three different branches of government. 3. The unit says that in film you must show, not tell. Is this always true? When might it bebetter to tell rather than show? Explain. Name the chamber of the senate of SC help me!!! Luis wants to buy a skateboard that usually sells for $79.19. All merchandise is discounted by 12%. What is the total cost of the skateboard if Luis has to pay a state sales tax of 7.25%. Round your intermediate calculations and answer to the nearest cent.Luis wants to buy a skateboard that usually sells for $79.19. All merchandise is discounted by 12%. What is the total cost of the skateboard if Luis has to pay a state sales tax of 7.25%. Round your intermediate calculations and answer to the nearest cent. The idea of banning bicycles on the Riverwalk in Chicago Silver, Chromium and Copper are these type of elements _____ Can I have the answers to EVERY question? A___ ______ cell has fine hairs (cilia) which are waved in a rhythm so that mucus can be moved? A group spends $277.50 to rent a total of 15 tubes. How many of each type of tube does the group rent? Differentiate between saving account and current account.