Answer:
A modulator
Explanation:
This device is called a modulator and it does the task of modulation. The act of modulation influences data information on the carrier, allowing signal to be sent over a bandpass frequency range.
The Modulator is what controls an input audio signal which is called a carrier. It does not make a sound. What it does instead is to change the original carrier sound wave. The work of the Modulator as evident in the question is the conversion of information signal to a signal compatible with the medium over which it is going to be transmitted.
Timothy is an architect. He needs to create a prototype of a new apartment that his firm is building. Which multimedia software would he use? A. image editing program B. painting program C. animation program D. digital video program E. 3D modeling program
ELO 3.6 Which type of iSCSI name requires a registered domain name to generate a unique iSCSI identifier?
Answer:
iSCSI Qualified Name (IQN).
Explanation:
iSCSI is simply an acronym for Internet Small Computer Systems Interface and it is typically an internet protocol (IP) with respect to a storage area network (SAN) standard used essentially for connecting data storage facilities over a transmission control protocol and internet protocol (TCP/IP).
iSCSI Qualified Name (IQN) is a type of iSCSI name that requires a registered domain name to generate a unique iSCSI identifier.
This ultimately implies that, a data storage organization must have a registered domain name in order to be able to generate an iSCSI Qualified Name (IQN). Also, the iSCSI Qualified Name (IQN) is not linked to an internet protocol (IP) address and as such it is considered to be a logical name.
pls help
Will give brainlest Ashton assigned a string value to a variable. Which program statement should he use?
2bookName = "Brave New World"
Book Name = "Brave New World"
bookName = "Brave New World"
bookName! = "Brave New World"
Answer:
I think its B bookName! = "Brave New World"
Explanation:
Answer:
B: Book Name = "Brave New World"
Explanation:
Write a method that accepts a number of seconds and prints the correct number of hours, minutes, and seconds.
Answer:
This solution is implemented in Java
public static void timme(int seconds) {
int hours = seconds/3600;
System.out.println("Hours: "+hours);
[tex]seconds = seconds - hours * 3600;[/tex]
int minutes = seconds/60;
System.out.println("Minutes: "+minutes);
[tex]seconds = seconds - minutes * 60;[/tex]
System.out.println("Seconds: "+seconds);
}
Explanation:
This method defines the method along with one parameter
public static void timme(int seconds) {
This calculates hours from the seconds
int hours = seconds/3600;
This prints the calculated hours
System.out.println("Hours: "+hours);
This calculates the seconds remaining
[tex]seconds = seconds - hours * 3600;[/tex]
This calculates the minutes from the seconds left
int minutes = seconds/60;
This prints the calculated minutes
System.out.println("Minutes: "+minutes);
This calculates the seconds remaining
[tex]seconds = seconds - minutes * 60;[/tex]
This prints the seconds left
System.out.println("Seconds: "+seconds);
}
Enumerate the four basic mathematical operations and their corresponding Excel operators.
Answer:
The four basic mathematical operations are Addition, subtraction, multiplication, and division.
Explanation:
Consider the provided information.
The four basic mathematical operations are Addition, subtraction, multiplication, and division.
Their corresponding Excel operators.
Addition: If you want to add 2 numbers in excel, for example, 3 and 5. use the operation
=3+5
Then press enter.
Subtraction: If you want to subtract 2 numbers in excel, for example, 5 and 3. use the operation
=5-3
Then press enter.
Multiplication: If you want to multiply 2 numbers in excel, for example, 3 and 5. use the operation
=3*5
Press enter.
Division: If you want to divide 2 numbers in excel, for example, 3 and 5. use the operation
=3/5
Press enter.
Hence, the four basic mathematical operations are Addition, subtraction, multiplication, and division.
To find any information on the Internet, we enter specific keywords into a search engine. What happens next
Answer:
Answer A
Explanation:
How do you change the order of the slides in your presentation in the slide pane 
Copy and paste
Delete
Drag and drop
Remove
Answer:
Hold down on your slide number and then pull in the order
Explanation:
Remember push down the pull up
Please helpppp. Rearrange the parts of the program to generate two random integers and then ask the user to guess the greatest common divisor.
First part
Second part
Fourth part
Third part
1. from math import gcd
from random import randrange
numA=randrange(6,50,2)
numB = randrange(6,30,2)
if guess == answer:
print("Good job! You are right.")
print("The right answer is",answer)
answer = gcd(numA,numB)
guess = input("Greatest common divisor of " + str(numA) + " and " + str(numB) + "? " )
Answer:
first part:
from math import gcd
from random import randrange
second part:
numA=randrange(6,50,2)
numB = randrange(6,30,2)
third part:
answer = gcd(numA,numB)
guess = input("Greatest common divisor of " + str(numA) + " and " + str(numB) + "? " )
fourth part:
if guess == answer:
print("Good job! You are right.")
print("The right answer is",answer)
Explanation:
got it right on edge
C++ Random Number Generation with a Range The modulus operator can produce random numbers in any range, much like 1 and 10 do. For instance, you could write int random = 1+ (rand()% 100) to produce numbers between 1 and 100.
What programs to generate two random integers?In the C/C++ computer languages, random number generation is accomplished using the rand() and srand() methods. The srand() value is fixed at 1, therefore the rand() function always produces the same results.
When we run the program, the same random number will be generated each time by the C++ rand() function. The srand (unsigned int seed) function is used to seed the rand() function.
Therefore, The pseudo-random number generation's starting point is set by the srand() function.
Learn more about random integers here:
https://brainly.com/question/15247918
#SPJ2
2. A __________ is a single function that the program must perform in order to satisfy the customer.
Answer: A software requirement is a single function that the program must perform in order to satisfy the customer.
Explanation:
A program is a set of instructions or commands that are required to perform a job. So before programming , we should know what we want our program to do so we can do it and then verify it.
The set of required tasks in our program is called as software requirement.
These are agreed by the customer and the developer before hand. Each software requirement describe a single wanted functionality from our program.
The cloud-based office suite will also work when users are offline.
Describe how this is possible.
Answer:
This is possible because the the system is managed by a third party and so the users don’t have to be online all the time for the office suite to work.
Explanation:
Hope this helped, I was stuck on this too :)
Cloud-based office suites, such as Microsoft Office 365, offer offline functionality through a technology called "offline access" or "offline mode."
When users are online, their files and documents are automatically synced and stored in the cloud, accessible from any device with an internet connection.
However, to enable offline access, the cloud-based office suite downloads a copy of essential files and data to the user's device.
This cached version allows users to continue working on their documents, spreadsheets, or presentations even when they are offline or experiencing internet connectivity issues.
Once the device regains internet access, the changes made in offline mode are automatically synced back to the cloud, ensuring seamless collaboration and data integrity.
Know more about office suite;
https://brainly.com/question/24207427
#SPJ5
Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use
Question:
Define a function compute_gas_volume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.
Answer:
This solution is implemented in C++
double compute_gas_volume(double P, double T, double n){
double V = 8.3144621 * n * T/P;
return V;
}
Explanation:
This line defines the function, along with three parameters
double compute_gas_volume(double P, double T, double n){
This calculates the volume
double V = 8.3144621 * n * T/P;
This returns the calculated volume
return V;
}
To call the function from the main, use:
cout<<compute_gas_volume(P,T,n);
Where P, T and n are double variables and they must have been initialized
For a computer to deliver continuous media it must guarantee the specific rate and timing requirements, also known as _____________.
Answer:
Quality-of-Service (QoS) guarantees
Explanation:
This task for a computer is known as Quality-of-Service (QoS) guarantees. This is basically a protocol that is built into a specific product or service which analyzes that application process and makes sure that everything is correct. This would include the rate and timing requirements that need to be met in order for the computer to deliver the continuous media. If this is not the case certain actions can be implemented using the data provided to fix this issue.
what are the qualities of different products that caught your eye and encourage you to buy them
Answer:
The qualities of different products that caught your eye and encourage you to buy them is described below in detail.
Explanation:
A fantastic method to do this would be to practice shiny colors in any advertisement you publish. This is an old method, but it's a great one. Glowing orange, for example, is sure to hold watching much higher than bland shades like gray. Play throughout here, and apply the color you think illustrates the eye most.
Give ways on how to effectively save.
Answer:
Explanation:
say goodbye to debt. Monthly debt payments are the biggest money suck when it comes to saving. ...
Cut down on groceries. ...
Cancel automatic subscriptions and memberships.
Which of the following did you include in your notes?
Check all that apply.
how you will keep costs down
how you will offer a better product
how you will be innovative in what you offer
Id
Economía
Answer:
How you will be innovative in what you offer
Explanation:
personally I think all 3 but it is what it is
Am giving BRAINLIEST!!!!!!! Assume you have entered the following after a prompt. >>> import time
How would you pause a program for 5 seconds?
Answer:
time.sleep(5)
Explanation:
What software application can be used to send and receive email messaging and management appointments in calendar's
Excel
One drive
Outlook
PowerPoint
Answer:
Outlook
Explanation:
how to promote CPA offers without a website?
Answer:
Report Promote Marketing For CPA Offer: Article advertising is the same as blog entry advancement. Agree to take some excellent article accommodation destinations and begin submitting encouraging posts. Compose articles that are by one Way or another pertinent to your exclusive CPA offer
Explanation:
:)
Why is user testing ah important part of the design process
Answer:
The general description of the whole of the general concept is described below.
Explanation:
Usability testing would be an important part including its customer construction business it allows users to see what works and where it doesn't function properly with someone's design elements. Keep challenging yourself to provide much more of your workshops through using at least yet another novel concept from that kind of blog post during your very next or even first and another round of research.
Plz help doe today 15 points
Answer:
there nothing in the doc
Explanation:
If you convinced your teacher to give you an extension on an assignment, what would this situation be an example of? OA. Generalization O O B. Prediction C. Drawing conclusions D. Rhetoric
Answer:
D. Rhetoric
Explanation:
Just trust me....okay!?......okay
A drop light that does not allow any electrical parts to come in contact with the outer casing of the device is called a:
Answer:
The right answer is "Double insulated light".
Explanation:
Double insulated led is mostly a sophisticated type of natural light that does not necessitate a terrestrial or planetary correlation. These illuminations could be based on these metals, are indicated in the electrical protection environmental standards that now the construction workers comply with, and therefore are readily accessible about every bedroom.What are the two extra registers that the fetch decode execute cycle uses to communicate with memory outside of the chip?
Answer:
Memory address register
Memory buffer register
Explanation:
In c/c++, the processor consists of mainly five stages.
FETCH DECODE EXECUTE MEMORYWRITE BACKThe memory address (MAR) register is a register where memory locations are being stored and where instructions are being fetched from the memory.
The memory buffer register (MBR) specifically enables the storage of data that are fetched or to be written in the memory.
What are the characteristics of desktop alerts in Outlook 2016? Check all that apply.
On-screen notifications will pop up for new emails, meeting invites, and new tasks.
Email pop-ups will display the sender's name, subject, and a small bit of the message.
Reading the pop-up alert is the best way to read email messages.
Desktop alerts cannot be turned off.
O Sound notifications can be customized.
Answer:
A & B
Explanation:
Answer:
A. On-screen notifications will pop up for new emails, meeting invites, and new tasks.
B. Email pop-ups will display the sender’s name, subject, and a small bit of the message.
E. Sound notifications can be customized.
Explanation:
this is for Outlook 2019
Write a method named swap that takes an int parameter followed by a double and prints them in the reverse order. For example, calling swap(4, 7.5) would print 7.5 4.
Answer:
Explanation:
The following code is written in Python and does exactly what is being asked in the question. It creates a function/method that takes in two parameters one int and one double, and prints them in reverse order. Double first and the Int second
def swap_numbers(int_num, double_num):
print(double_num, int_num)
The method named swap that takes an int parameter followed by a double
and prints them in the reverse order is as follows:
def swap(x, y):
print(y, x)
swap(4, 7.5)
The code is written in python
A function/method is declared in python.
This method accept two parameters x and y.
The parameters accept integers and double(float) respectively.
Then we call the functions/method with its parameters.
learn more: https://brainly.com/question/19880203?referrer=searchResults
5. Give an example of a database application that has hundreds of users and a very large and complicated database.
Answer:
IBM DB2
Explanation:
Database Applications are separate applications that do not have a specific database, instead, they are used to be able to manipulate any database that you have access to. One very popular database application that has hundreds of users is IBM DB2. This database application was created by the company IBM which is a multinational company and can even be used to access their own database which is extremely large, and as any database the larger it is the more complicated it is as well since there is more data to sift through
Write a method doubleUp that doubles the size of a list of integers by doubling-up each element in the list. Assume there's enough space in the array to double the size.
Answer:
The solution in Python is as follows:
class myClass:
def doubleUp(self,doubleList):
doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]
newlist = []
n = int(input("Number of elements: "))
for i in range(n):
num = int(input(": "))
newlist.append(num)
list = myClass()
list.doubleUp(newlist)
print(newlist)
Explanation:
Start by creating a class
The solution in Python is as follows:
class myClass:
Then define the method doubleUp
def doubleUp(self,doubleList):
The duplicates is done here
doubleList[:0] = doubleList[::2] = doubleList[1::2] = doubleList[:]
The program main begins here
This defines an empty list
newlist = []
This prompts user for number of elements
n = int(input("Number of elements: "))
The following iteration get the elements of the list
for i in range(n):
num = int(input(": "))
newlist.append(num)
This defines the instance of the class
list = myClass()
This calls the method
list.doubleUp(newlist)
Lastly, this prints the duplicate list
print(newlist)
Write a program that first gets a list of integers from input. That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds).
Answer:
The program in Python is as follows:
mylist = []
num = int(input("Length: "))
for i in range(num):
inp = int(input(": "))
mylist.append(inp)
lower = int(input("Lower Bound: "))
upper = int(input("Upper Bound: "))
for i in mylist:
if i >= lower and i <= upper:
print(i, end=" ")
Explanation:
This initializes an empty list
mylist = []
The prompts the user for length of the list
num = int(input("Length: "))
The following iteration reads input into the list
for i in range(num):
inp = int(input(": "))
mylist.append(inp)
This gets the lower bound of the range
lower = int(input("Lower Bound: "))
This gets the upper bound
upper = int(input("Upper Bound: "))
This iterates through the list
for i in mylist:
This checks for elements of the list within the range
if i >= lower and i <= upper:
This prints the list element
print(i, end=" ")
Answer:input_numbers = [int(x) for x in input().split(' ')]
input_range = [int(x) for x in input().split(' ')]
for number in input_numbers:
if input_range[0] <= number <= input_range[1]:
print('{}'.format(number), end = ' ')
Explanation:
2.You have been specifically asked to implement a stream cipher. Which cryptographic algorithm could you use
Answer:
symmetric-key cryptography
Explanation:
There are two types of cryptographic algorithms, the public key algorithm which uses a public key to encode a message before transmission and a private key to decode the message after transmission, and the private key or symmetric key algorithm which uses a private key to both encode and decode a message.
What colorful format should you use to bring attention to an important sentence or phrase
Font size
Highlight
Italicize
Underline
Answer:
Highlight
Explanation:
Answer:
Highlight
Explanation: