Answer:
planation:
I got this
Effective nonverbal communication can cause tension.
True or False
Explanation:
When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.
Answer:
False
Explanation:
How do science, mathematics, and technology each influence engineering
Answer:
In order to start engineering you must know the basics Science, Math, and Technology. For example you need math to get all the parts in the right place and fix any pieces that need to be angled right, science because you need to know what happens if you put this with that if it’ll spark break or anything, and technology because you need to know the different pieces and their purpose, hope it helps!
Explanation:
Answer:
Math: By using numbers and some problems are really hard and they like solving them makes some kids want to do engineering
Science: By do expirments and getting kids excited about doing something like engineering
Technolgy: I think this speaks for itself by saying that if you like computers and dealing with technogly you would want to do engineering
Explanation:
The ____ view displays the worksheet the way it will look when it prints.
A) Normal
B) Page layout
C) Break
D) Page settings
what are the condition of machines or equipment if the parts of the equipment are easy to assemble and disassemble
Answer:
Explanation:
i dont now
I need help building a computer what are some good parts?
Answer:
glass for the screen, wires to connect everything, something for the buttons, you also might need a screen protector so it can help your eyes because the screen will be bright, use something that will help the computer not fall off the desk, you also need to make some space at the bottom of the computer for the sound to go through, you need to make some more space at the either side you want the charger for it to always have power so you can always use it, and memory space, if you want to you can add a little space at the side for your earbuds.
Explanation:
you need to have your parents help you so you don't get hurt.
14. The term used to describe an attribute that can function like a primary key is a?
Answer:
The answer to this question is given below in this explanation section.
Explanation:
In the relationship model of database a primary key is a specific choice of a minimal set of attributes that uniquely specific a tuple in a relation.Informally a primary key is which attribute and in simple cases are simple a single attribute.More formally a primary key is a choice of candidate key any other candidate key is an alternate key.
A primary key may consists of real word observable in which way it is called natural key,while an attribute created to function as a key and not use for identification outside the database is called a surrogate key.For example for a database of people time and location of birth could be a natural key.National identification number is another example of an attribute that may be used as an natural key.
What is wrong with the following code?
numl = int (input("Enter a number: "))
numz = int (input("Enter a number: "D)
num3 = int (input("Enter a number: "))
print ("The average is: + (numl + num2 + num3/3)
The last line should be print ("The average is: (numl + num2 + num/3)
The variables should be lnum, 2num, Bnum
It needs a into command
It needs a stro command
Code:
numl = int (input("Enter a number: "))
num2 = int (input("Enter a number: "))
num3 = int (input("Enter a number: "))
print ("The average is:" + ((numl + num2 + num3)/3))
Answer:
It needs a str command
Explanation:
Given
The above code
Required
Determine and correct the error
At the last line of the code, there is an attempt to print the average of the three numbers.
However, this will return an error because:
In order to print the literal "The average is:" and the numeric value of (numl + num2 + num3)/3, a str command is needed.
This converts (numl + num2 + num3)/3 to a literal and then print without error.
So, the correct instruction is:
print ("The average is:" + str((numl + num2 + num3)/3))
hellllllllllp i need hlel dad
Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and give several specific examples. How do you make sure your ideas are original and not copied directly from other video games?
Answer:
you could say that you would put watermarks in some frames so you can prove u made it yourself
Explanation:
Writers develop plot arcs and dialogue, artists construct 2D and 3D models, composers produce soundtracks, programmers choreograph all the moving parts into a cohesive universe. The artwork is an eclectic mix. The audience and players have a first-person perspective while playing the games.
What personal creativity and ideas for video games?Playing video games can increase your reaction times and hand-eye coordination, two skills that are essential to creativity. Game design is the process of using creativity and design to produce a game for entertainment or educational purposes. It is a part of the broader field of creating video games.
Post-Release Assistance. This is a crucial element in the various stages of game development. Most projects fail because this important component is overlooked.
Therefore, You may claim that you would include watermarks in select frames to demonstrate your authorship.
Learn more about creativity here:
https://brainly.com/question/17081416
#SPJ2
WILL GIVE BRAINLIEST!!!!!!!!!
The Port of New Orleans is not considered an intermodal port.
True
False
Answer:
True
Explanation:
Which filter gives a “squeezed” effect to an image?
Explanation:
When using the pinch filter, you simply select a percentage from -100 to 100 to pinch or squeeze your image. The Pinch filter squeezes a selection or layer inward or outward.
Steven has listed printers, monitors, plotters, and copy machines at his place of work. Now he is reading manuals. Steven is creating a _____.
Web page
database
maintenance schedule
word-processing document
Answer: Web page
Explanation:
A web page can be defined as a document that is written in an HTML format. This can be viewed using an internet browser. It can be accessed by using the URL address in the address bar. The printers, monitors, copy machines and other necessary machines can be required for creation of web page. The printers are required to get the soft copy of the web page so that a proof reading can be done on the content of the web page, copy machines are used to scan the necessary pictures or text to be pasted on the web page, monitors are used to observe the development of the web page. Plotters are used for printing the graphs that can be scanned for web page.
Help Me
What are the four types of graphic models?
Answer:
-Bayesian network
-Naive Bayes classifier where we use a tree with a single root
-Dependency network where cycles are allowed
-Tree-augmented classifier or TAN model
Explanation:
You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. A different set of observations might result in a larger portion of male drivers being on the phone. Your program compared an equal number of male and female drivers. It is important to test your program with a small enough set of data that you can know what the result should be. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. You could modify the program to allow the user to enter the data.
Answer:
1,3,4,5 (It's not the one that starts with your program)
Explanation:
Edge 2020
A driver is essentially a piece of software that enables communication between an operating system and a device. Consider the scenario where a device needs to read some data from an application.
What program to compare the portion of drivers?Type “device management” into the taskbar's search box, then click on Device Manager. To see the names of the devices, choose a category, then right-click (or press and hold) the item you want to update. Decide Automatically check for driver software updates.
A computer software known as a driver, sometimes known as a device driver, that serves as a bridge between the operating system and a device such a disk drive, video card, printer, or keyboard.
Therefore, The device's collection of specific commands must be thoroughly understood by the driver.
Learn more about program here:
https://brainly.com/question/3224396
#SPJ2
12) --- In-Excel, Columns-are-labelled as
a) +A, B, C, etc
b)+1,2,3.etc
C-A1, A2, etc. 1
d)+ $A$1, $A$2. etc. I
Answer:
C-A1, A2, etc.
E-mail is a special form of business communication.
is the set of rules that governs communication using e-mail.
Answer:
Your answer would be 'Netiquette ' .
Hope this helped you out :D
Helpppppppppppppppppppp
can someone help me with Exercise 7.1.5: Initials on codehs.
7.1.5 Codehs:
Write a program that gets a string containing a person's first, middle and last names, and then display their first, middle and last initials. For example, if the user enters John William Smith, the program should display J. W. S. [In python]
Answer:
first = input("First name: ")
middle = input("Middle name: ")
last = input("Last name: ")
print(first[0]+". "+middle[0]+". "+last[0]+".")
Explanation:
This line prompts user for first name
first = input("First name: ")
This line prompts user for middle name
middle = input("Middle name: ")
This line prompts user for last name
last = input("Last name: ")
This line prints the name initials
print(first[0]+". "+middle[0]+". "+last[0]+".")
Answer:
def initials(string, new_string):
return string[0] + "." + new_string[0] + "."
print(initials("Your", "Name"))
Explanation:
Please help me figer out hot to change the letter to a C
Answer:I
I do not know sorry, but I will try and see if I can sear how to do it..
Explanation:
Answer:
find where it says d and delete it and add a c
Explanation:
but if you reload it will go back to normal
Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for each pixel
Answer: 3 bytes
Explanation:
A Pixel uses 3 colors and each of these colors uses 8 bits to store their intensity.
One pixel will therefore have:
= 8 * 3
= 24 bits
1 byte = 8 bits
24 bits will therefore be:
= 24/8
= 3 bytes
Answer:
3 bytes...I think
Explanation:
assignment 1: silly sentences edhesive
Answer:
print("Let's play Silly Sentences!")
print(" ")
name=input("Enter a name: ")
adj1=input("Enter an adjective: ")
adj2=input("Enter an adjective: ")
adv=input("Enter an adverb: ")
fd1=input("Enter a food: ")
fd2=input("Enter another food: ")
noun=input("Enter a noun: ")
place=input("Enter a place: ")
verb=input("Enter a verb: ")
print(" ")
print(name + " was planning a dream vacation to " + place + ".")
print(name + " was especially looking forward to trying the local \ncuisine, including " + adj1 + " " + fd1 + " and " + fd2 + ".")
print(" ")
print(name + " will have to practice the language " + adv + " to \nmake it easier to " + verb + " with people.")
print(" ")
print(name + " has a long list of sights to see, including the\n" + noun + " museum and the " + adj2 + " park.")
Explanation:
Got it right. Might be a longer version, but it worked for me.
Need help asapppppppppp
Answer:
artistic
Explanation:
because being it is considered a art
Answer:
daddy
Explanation:
Have any of you guys had to deal with not seeing profile pictures or not being able to open PDFs on this website? Is it just me or an overall glitch of the Brainly system?
You want to ensure that a project team can only access the files specifically created for them, and no other files. Which term is most correct in describing this configuration?
Answer:
Least privilege model.
Explanation:
In Computer science, the least privilege model can be defined as an information security model which typically involves giving a user the minimum level of permission, access or rights required to perform his or her duties, tasks or job functions.
In this scenario, you want to ensure that a project team can only access the files specifically created for them, and no other files. Thus, the term which is most correct in describing this configuration is least privilege model.
Basically, the least privilege model ensures a particular user is only given the barest minimum of rights, permission or access needed to perform a task.
Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.
Please help! I tried this by myself. But I am not sure if this is right.
Answer:
Yes this is correct
Explanation:
btw trust yourself, believe in yourself because you can do it. I believe in you ;)
Answer:
This is correct
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center ___________ layer.
Answer:
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.
Explanation:
Consider the given information.
A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.
Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.
Imma say something random...
like LOL
who ever likes Gacha games with tik tok
go follow "ashten.ace" if ya want UwU
he's pretty good in my opinion
okay thx BYEEEEEEEEEEE <3
Answer:
Uh I don't understand what you said.
Explanation:
N/A
Tennis players are not allowed to swear when they are playing in Wimbledon
Answer:
True
Explanation:
Answer:
Yes
Explanation:
Analyze the difference between security settings and privacy settings.
Answer:
Explanation:
Security settings controls people getting through and into your devices. It is more of a protection while privacy is just more of who and what can be viewed.