Answer:
2,000
Explanation:
I am in collage
Answer: i wish i could help you
Explanation:
i wish i could help you
you are considering cloud services, and you concerned about the interaction of your security policies and those of the hosting provider. What can alleviate your concern
Answer:
Cloud access security brokers
Explanation:
Cloud access security brokers (CASBs) can alleviate your concern. This is a software that is between cloud service users and cloud applications. Monitoring every activity and ensuring security protocols.
It does the work of merging the security policies of users and that of the providers. Across cloud platforms, the CASB can help to identify unsanctioned use.
How do science, mathematics, and technology each influence engineering
Answer:
In order to start engineering you must know the basics Science, Math, and Technology. For example you need math to get all the parts in the right place and fix any pieces that need to be angled right, science because you need to know what happens if you put this with that if it’ll spark break or anything, and technology because you need to know the different pieces and their purpose, hope it helps!
Explanation:
Answer:
Math: By using numbers and some problems are really hard and they like solving them makes some kids want to do engineering
Science: By do expirments and getting kids excited about doing something like engineering
Technolgy: I think this speaks for itself by saying that if you like computers and dealing with technogly you would want to do engineering
Explanation:
12) --- In-Excel, Columns-are-labelled as
a) +A, B, C, etc
b)+1,2,3.etc
C-A1, A2, etc. 1
d)+ $A$1, $A$2. etc. I
Answer:
C-A1, A2, etc.
Please help! I tried this by myself. But I am not sure if this is right.
Answer:
Yes this is correct
Explanation:
btw trust yourself, believe in yourself because you can do it. I believe in you ;)
Answer:
This is correct
A website for a certain political party or candidate is likely to have unbiased
information. Choose the answer.
True
False
Answer:the answer is false i had the same question in my test and i put false i got it right
Explanation:
Question 11
1 pts
You need to find the square root of a value. Which of the following functions would you
use?
int
fabs
pow
O sqrt
Answer:
sqrt
Explanation:
Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task. It can be classified into the following categories;
If you need to find the square root of a value. The function you would use is sqrt.
In Computer programming, the sqrt () function is a mathematical tool which allows a user to find the square root value of any numerical value (numbers)
For example the code for finding the square root of a value using Python programming language is;
num = 36
\\This is the value of the original number\\
sqrt = num ** (0.5)
print ("The square root of the number "36" is 6")
Answer:
sqrt
Explanation:
i'm in python
Steven wrote an algorithm for his coding class that explains how he puts on his shoes. Which is the correct sequence of steps that Steven used?
Place foot in shoe, untie laces, tie laces
Tie laces, place foot in shoe, untie laces
Untie laces, place foot in shoe, tie laces
Untie laces, tie laces, place foot in shoe
untie laces ,place foot in shoe, tie laces maybe?
Fill in the blank with the correct response:
_____ is information about an object that is stored and used.
How do I find where I have used Premium Feature in CANVA
I am a free user
Answer: Ok go to the website (Canva) and you will see they have plan like there is one that is free, and there is one that is name pro but you have to pay $12.95 and the last one is Enterprise which cost $30.00
Hope this help :)
Explanation:
Steven has listed printers, monitors, plotters, and copy machines at his place of work. Now he is reading manuals. Steven is creating a _____.
Web page
database
maintenance schedule
word-processing document
Answer: Web page
Explanation:
A web page can be defined as a document that is written in an HTML format. This can be viewed using an internet browser. It can be accessed by using the URL address in the address bar. The printers, monitors, copy machines and other necessary machines can be required for creation of web page. The printers are required to get the soft copy of the web page so that a proof reading can be done on the content of the web page, copy machines are used to scan the necessary pictures or text to be pasted on the web page, monitors are used to observe the development of the web page. Plotters are used for printing the graphs that can be scanned for web page.
assignment 1: silly sentences edhesive
Answer:
print("Let's play Silly Sentences!")
print(" ")
name=input("Enter a name: ")
adj1=input("Enter an adjective: ")
adj2=input("Enter an adjective: ")
adv=input("Enter an adverb: ")
fd1=input("Enter a food: ")
fd2=input("Enter another food: ")
noun=input("Enter a noun: ")
place=input("Enter a place: ")
verb=input("Enter a verb: ")
print(" ")
print(name + " was planning a dream vacation to " + place + ".")
print(name + " was especially looking forward to trying the local \ncuisine, including " + adj1 + " " + fd1 + " and " + fd2 + ".")
print(" ")
print(name + " will have to practice the language " + adv + " to \nmake it easier to " + verb + " with people.")
print(" ")
print(name + " has a long list of sights to see, including the\n" + noun + " museum and the " + adj2 + " park.")
Explanation:
Got it right. Might be a longer version, but it worked for me.
what are the condition of machines or equipment if the parts of the equipment are easy to assemble and disassemble
Answer:
Explanation:
i dont now
An analyst determines the value of investments
True
False
Answer:
It is true
Explanation:
Helpppppppppppppppppppp
Learning task 1: introduction A.Direction:below are jumbled letters. Write the correct spelling opposite of the scramble letters. 1.GNISSRED 2.MMONEL UIJEC 3.ISENNOAYMA 4.MULEISIFRE 5.TERIRESHSECROW
Answer:
Following are the solution to this question:
Explanation:
For point 1: DRESSING
For point 2: LEMON JUICE
For point 3: MAYONNAISE
For point 4: EMULSIFIER
For point 5: WORCESTERSHIRE
Each pixel includes 3 colors; Red, Green and Blue. Each color uses 8 bits to store it's intensity. How many Bytes are needed for each pixel
Answer: 3 bytes
Explanation:
A Pixel uses 3 colors and each of these colors uses 8 bits to store their intensity.
One pixel will therefore have:
= 8 * 3
= 24 bits
1 byte = 8 bits
24 bits will therefore be:
= 24/8
= 3 bytes
Answer:
3 bytes...I think
Explanation:
What is the output for the following program?
numA = 10
while numA < 21:
numA = numA + 5
print(numA)
Answer:
Output:
15
20
25
Explanation:
In first iteration value of num is 10. Condition is checked 10 is less than 21 so value of num is incremented by 5 and value 15 is printed than again condition is checked 15<21 so value of num is incremented again and 20 is printed. Again condition is checked 20<21. So 25 is printed. Then 4th time when condition is checked vakue of num is 25 and while loop condition becomes false because 25 is not less than 21 and program is terminated here.
Answer: 15,20,25
Explanation: got it right on edgen
identify the tools on the boxes. write the answer
Answer:
im going off of what i know =( 2 screw driver 3 zip ties 5 needle nose plyers 8 can air
Explanation:
Analyze the difference between security settings and privacy settings.
Answer:
Explanation:
Security settings controls people getting through and into your devices. It is more of a protection while privacy is just more of who and what can be viewed.
Help me please! (*13* points!)
Please answer the following essay question:
Why would it be useful to use data bars and Sparklines in an Excel table?
Answer in paragraph form using 5-7 complete sentences.
Answer:
Sparklines and data bars are often used in Excel tables. Their impact comes from viewing many of them together and being able to quickly compare them one above the other, rather than viewing them singly. They make it easy to see the outliers, the rows that are not performing like the others. Although they are small, each sparkline often represents multiple data points, often over time. Data bars can represent multiple data points, but typically illustrate only one. Each sparkline typically presents a single series.
Explanation:
What is the purpose of a Post Mortem Review?
To check the code for spelling
To prove the algorithm is correct
To understand how the code can be improved
To check the code for formatting
Answer:
A post-mortem meeting is held at the end of a project. The goal is to look at the project from start to finish to determine what went right and what can be improved. By the end of the meeting, you should have identified best practices and opportunities for improvement going forward.
Explanation: NONE
Answer:
A post-mortem meeting is held at the end of a project.
Explanation:
14. The term used to describe an attribute that can function like a primary key is a?
Answer:
The answer to this question is given below in this explanation section.
Explanation:
In the relationship model of database a primary key is a specific choice of a minimal set of attributes that uniquely specific a tuple in a relation.Informally a primary key is which attribute and in simple cases are simple a single attribute.More formally a primary key is a choice of candidate key any other candidate key is an alternate key.
A primary key may consists of real word observable in which way it is called natural key,while an attribute created to function as a key and not use for identification outside the database is called a surrogate key.For example for a database of people time and location of birth could be a natural key.National identification number is another example of an attribute that may be used as an natural key.
50 POINTS!!!!!!!!!!!
Give at least two examples of how the transport layer is used.
Answer:
The transport layer is responsible for delivering data to the appropriate application process on the host computers. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.
Explanation:
Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.
Answer:
1. The transport layer is responsible for delivering data to the appropriate application process on the host computers. and 2. Some transport layer protocols, for example TCP, but not UDP, support virtual circuits, i.e. provide connection-oriented communication over an underlying packet-oriented datagram network.
-CC
Choose the type of error described.
______ occurs when the result is wrong because of the programmer's mistake, such as multiplying two numbers when they should have been added
______ occurs when you use the wrong punctuation, such as print 'hello' without parentheses
______ occurs when the program starts running, but encounters an error such as trying to divide by zero
A. runtime
B. logical
C. syntax
Answer:
first scenario: B
second scenario: C
third scenario: A
hope this helps! :-)
Answer:
1.logical occurs when result is wrong
2.syntax occurs when the wrong punctuation is use
3.runtime occurs when program starts running
Explanation:
6 → What is the difference between SHA-256 and SHA-512?
Explanation:
SHA-2: A group of two related hash functions, identified as SHA-256 and SHA-512.
The word size varies; SHA-256 uses 32-byte characters, whereas 64-byte words are used by SHA-512.
Complete the steps for saving a presentation as a poi file,
Click on the File tab.
Next, click on
In the drop do
OR
Click on the F
Copy & Print
Next, click on
Last, click
Send
Save As
Answer:
Click on the F
Copy & Print
Next, click on
Last, click
Send
Save As
Explanation:
This is because save means it will save your file as the same you have made but drop do means to cut or don't save the file that's why it should be the second one means:Click on the F
Copy & Print
Next, click on
Last, click
Send
Save As
What is the name of the protocol used with IPv6 to learn the Layer 2 addresses that exist on the same local network
Answer:
Network Discovery Protocol (NDP)
Explanation:
An IP address is an acronym for internet protocol address and it can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.
In Computer networking, IP address are classified into two (2) main categories and these are;
1. Local (internal) IP address.
2. Global (external) IP address.
Also, the internet protocol (IP) address comprises of two (2) versions and these are;
I. Internet protocol version 4 (IPv4): this is the first and original version of the internet protocol which was introduced in 1983 using the Advanced Research Projects Agency Network (ARPANET). An example of an IPv4 address is 192.168.1.0.
II. Internet protocol version 6 (IPv6): it is the modified (latest) version of the IPv4 address system and as such can accommodate more addresses or nodes. An example of an IPv6 is 2001:db8:1234:1:0:567:8:1.
Hence, Internet protocol version 6 (IPv6) was developed and introduced to replace the previous version (IPv4); Internet protocol version 4. The best statement which describes a benefit of IPv6 over IPv4 is that, Internet protocol version 6 (IPv6) eliminates the use of hierarchy in addressing, making addresses easier to use because the size of the routing table is smaller (reduced) and as such making routing with IPv6 to be more efficient.
Hence, Network Discovery Protocol (NDP) is the name of the protocol used with IPv6 to learn the Layer 2 addresses that exist on the same local network.
Janice’s grandmother stayed at home and took care of her family while her grandfather worked. Today Janice lives on her own and has a full time job. What factor that affects the labor market is represented in this situation? a. Population shift b. Social change c. World event d. Government action
Answer:
Social change
Explanation:
The factor that affects the labor market as represented in this situation is Social change.
What is social change?Social change is known to be the way that which people often use in interaction with others. It is also known as the way that relationships changes cultural and social institutions in course of time.
Conclusively, social changes do have long‐term effects such as industrial revolution and it is the factor that influence the labor market as shown in this situation above.
Learn more about Social change from
https://brainly.com/question/13391889
Which statement assigns the value 140 to the variable streetNumber in Python?
streetNumber = 140
streetNumber! = 140
street number = 140
StreetNumber == 140
Answer:
Explanation:
Option 1 (streetNumber = 140) is right one.
Because we use = symbol for assigning a value. It is also called as assignment operator. We didn't selected the option 3 which is street number = 140 because variable name donot contain any space.
name tow ways to render a program as a single file
Answer:
*two
Explanation: and im not sure but have a great day and good luck on whatever you are doing!