Lets do a who know me better! 5 questions! if you get 4\5 you get brainliest or a 3\5 but anything below u dont get it!


How old am I?

Do I like Summer or Winter?

Whats my name? (You guys should get this.)

What grade am I in? (Its between 4th and 8th).

How many siblings do I have? ( its between 2 and 5)

Good Luck!

Answers

Answer 1

Answer:your 13

you enjoy winter but still like summer

Skylar

either 7 or 8th

3 siblings

Explanation:


Related Questions

Tennis players are not allowed to swear when they are playing in Wimbledon

Answers

Answer:

True

Explanation:

Answer:

Yes

Explanation:

You want to ensure that a project team can only access the files specifically created for them, and no other files. Which term is most correct in describing this configuration?

Answers

Answer:

Least privilege model.

Explanation:

In Computer science, the least privilege model can be defined as an information security model which typically involves giving a user the minimum level of permission, access or rights required to perform his or her duties, tasks or job functions.

In this scenario, you want to ensure that a project team can only access the files specifically created for them, and no other files. Thus, the term which is most correct in describing this configuration is least privilege model.

Basically, the least privilege model ensures a particular user is only given the barest minimum of rights, permission or access needed to perform a task.

A typical day in programming and software development would involve

monitoring network connections.

figuring out why a computer will not turn on.

using an image-editing program.

writing code for a software program.

Answers

Answer:

writing code for a software program.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.

The five (5) standard stages of development in software development are;

I. Analysis.

II. Design.

III. Implementation (coding).

IV. Testing.

V. Maintenance.

A typical day in programming and software development would involve writing code for a software program.

Generally, software applications or programs require a code containing series of sequential instruction to perform specific tasks, commands and processes. These sets of code are typically written by a software developer (programmer).

Please help me figer out hot to change the letter to a C

Answers

Answer:I

I do not know sorry, but I will try and see if I can sear how to do it..

Explanation:

Answer:

find where it says d and delete it and add a c

Explanation:

but if you reload it will go back to normal

can someone help me with Exercise 7.1.5: Initials on codehs.

Answers

7.1.5 Codehs:

Write a program that gets a string containing a person's first, middle and last names, and then display their first, middle and last initials. For example, if the user enters John William Smith, the program should display J. W. S. [In python]

Answer:

first = input("First name: ")

middle = input("Middle name: ")

last = input("Last name: ")

print(first[0]+". "+middle[0]+". "+last[0]+".")

Explanation:

This line prompts user for first name

first = input("First name: ")

This line prompts user for middle name

middle = input("Middle name: ")

This line prompts user for last name

last = input("Last name: ")

This line prints the name initials

print(first[0]+". "+middle[0]+". "+last[0]+".")

Answer:

def initials(string, new_string):

   return string[0] + "." + new_string[0] + "."

print(initials("Your", "Name"))

Explanation:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center ___________ layer.

Answers

Answer:

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.

Explanation:

Consider the given information.

A key point for security and application services is the aggregation layer. In the data centre aggregation layer, the Layer 4 security and application services provide server load balancing, SSL offloading, firewalling, and IPS services.

Layer 4 security and application services, including server load balancing, Secure Sockets Layer (SSL) offloading, firewalling, and intrusion prevention system (IPS) services are provided by the data center aggregation layer.

You wrote a program to compare the portion of drivers who were on the phone. Which statements are true? Select 4 options. A different set of observations might result in a larger portion of male drivers being on the phone. Your program compared an equal number of male and female drivers. It is important to test your program with a small enough set of data that you can know what the result should be. Even when confident that the mathematical calculations are correct, you still need to be careful about how you interpret the results. You could modify the program to allow the user to enter the data.

Answers

Answer:

1,3,4,5 (It's not the one that starts with your program)

Explanation:

Edge 2020

A driver is essentially a piece of software that enables communication between an operating system and a device. Consider the scenario where a device needs to read some data from an application.

What program to compare the portion of drivers?

Type “device management” into the taskbar's search box, then click on Device Manager. To see the names of the devices, choose a category, then right-click (or press and hold) the item you want to update. Decide Automatically check for driver software updates.

A computer software known as a driver, sometimes known as a device driver, that serves as a bridge between the operating system and a device such a disk drive, video card, printer, or keyboard.

Therefore, The device's collection of specific commands must be thoroughly understood by the driver.

Learn more about program here:

https://brainly.com/question/3224396

#SPJ2

Help Me

What are the four types of graphic models?

Answers

Answer:

-Bayesian network

-Naive Bayes classifier where we use a tree with a single root

-Dependency network where cycles are allowed

-Tree-augmented classifier or TAN model

Explanation:

hellllllllllp i need hlel dad

Answers

miss girl whatttttttttt

wap in java to complete the following (16*1) +(14*2) +(12*3) +(10*4) +(8*5) +(6*6) +(4*7)​

Answers

Answer:

It goes like:

public class Program

{

public static void main(String[] args)

{

int j=18;

int sum=0;

for (int i =1; i<7; i++)

{

sum=sum+(i*(j-2));

j=j-2;

}

System.out.println(sum);

}

}

Explanation:

Variables used:

j : controls the first number in product and decreases by 2 each time the loop runs.

sum: saves the values of addition as the loop runs.

Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.

Answers

What I think the highest is carbon dioxide . Because we use a lot of CO2 in every single day . So image that for 365 . We use a lot of carbon dioxide . In which that is ruining our earth

Imma say something random...



like LOL
who ever likes Gacha games with tik tok
go follow "ashten.ace" if ya want UwU
he's pretty good in my opinion


okay thx BYEEEEEEEEEEE <3

Answers

Answer:

Uh I don't understand what you said.

Explanation:

N/A

Which filter gives a “squeezed” effect to an image?

Answers

Explanation:

When using the pinch filter, you simply select a percentage from -100 to 100 to pinch or squeeze your image. The Pinch filter squeezes a selection or layer inward or outward.

can someone help me on codehs. its 7.1.5: initials. here is what your supposed to do

Write a function called initials that will take a first and last name and return their initials using the following format:

initials("Tracy", "Turtle")
# => "T.T."
initials("Peter", "Parker")
# => "P.P."

Answers

Answer:

first = input( "What is your first name? " )

last = input( "What is your last name? " )

def initials():

   print ("Your initials are: "+first[0]+"."+last[0]+".")

initials ()

Explanation:

it works when I test but it won't submit. Hope this helps

Following are the program to prints the initials of the input value.  

Program Explanation:

Defining a class Main.Inside the class, a method "initials" is declared that takes two string variables "first, last" in the parameter.Inside the method, a return keyword is defined that uses the charAt method that returns the first character value of the parameters. In the next step, the main method is defined.Inside the main method, a print method is declared that calls initials method that accepts value in the parameter and prints its value.

Program:

public class Main //defining a class Main

{

   static String initials(String first, String last)//defining a String method initials that input two variables in the parameter

   {

       return first.charAt(0)+"."+last.charAt(0)+".";//using charAt method that returns first character value

   }

 public static void main(String[] as) //defining main method

 {

   System.out.println(initials("Tracy", "Turtle"));//using print method that calls initials method that accepts value in parameter

   System.out.println(initials("Peter", "Parker"));//using print method that calls initials method that accepts value in parameter

 }

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/2810164

Have any of you guys had to deal with not seeing profile pictures or not being able to open PDFs on this website? Is it just me or an overall glitch of the Brainly system?

Answers

Me too man me too yeah

Cody needs to print a message to the screen using Python. Which shows the correct way to code a print statement?
Oprint("I can code.")
O print (I can code.)
O print - I can code.
Oprint (I can code);

Answers

Answer:

A. print ("I can code.")

Explanation:

In this scenario, Cody needs to print a message to the screen using Python. The command which shows the correct way to code a print statement is print ("I can code.").

In Python programming, the print () function is used for printing a specific output message. The syntax for the print function includes using double quotation marks to enclose the text (string).

An example of an executable code using Python programming language is;

Print ("1. RED")

Print ("2. BLUE")

COLOR = Int(input("Please select your favorite color by entering a number:"))

If (COLOR == 1);

Print ("You chose Color Red")

elif (COLOR == 2);

Print ("You chose Color Blue")

else;

Print ("You have entered a wrong number")

Answer: A print I can code

what are the secure methods when transmitting data?

Answers

Answer:

Many secure transmission methods require a type of encryption. The most common email encryption is called PKI.

Explanation:

Bananas are curved because they grow towards the sun ☀️

Answers

Answer:

Yes bc nutrients twords the sun!

Explanation:

Answer:

yes?

Explanation:

The ____ view displays the worksheet the way it will look when it prints.

A) Normal

B) Page layout

C) Break

D) Page settings

Answers

I think you are looking for page layout. You can typically see it before printing out a page
page layout should be correct

overview of your opinion of Digital Access

Answers

Answer:

What type of digital access I can further answer if you tell me

Explanation:

I think its ok sometimes, but other times its just stupi.d

Effective nonverbal communication can cause tension.

True or False

Answers

Explanation:

When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.

Answer:

False

Explanation:

Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and give several specific examples. How do you make sure your ideas are original and not copied directly from other video games?

Answers

Answer:

you could say that you would  put watermarks in some frames so you can prove u made it yourself

Explanation:

Writers develop plot arcs and dialogue, artists construct 2D and 3D models, composers produce soundtracks, programmers choreograph all the moving parts into a cohesive universe. The artwork is an eclectic mix. The audience and players have a first-person perspective while playing the games.

What personal creativity and ideas for video games?

Playing video games can increase your reaction times and hand-eye coordination, two skills that are essential to creativity. Game design is the process of using creativity and design to produce a game for entertainment or educational purposes. It is a part of the broader field of creating video games.

Post-Release Assistance. This is a crucial element in the various stages of game development. Most projects fail because this important component is overlooked.

Therefore, You may claim that you would include watermarks in select frames to demonstrate your authorship.

Learn more about creativity here:

https://brainly.com/question/17081416

#SPJ2

Project: big research project

Answers

Answer:

Where is the question?

Explanation:

Cool, where is the question. If u want us to answer ur gonna have to give a question or picture lol

E-mail is a special form of business communication.
is the set of rules that governs communication using e-mail.

Answers

Answer:

 Your answer would be 'Netiquette ' .

Hope this helped you out :D

Pedro needs to write a block of code that will repeat a loop six times. Which type of loop should he use?

for
else
else-if
while

Answers

Answer: D

Explanation:

Answer:

im pretty sure its for

Explanation:

Question #3
Which techniques are useful when evaluating a program? Select 4 options.
O user experience testing
print debugging
defuncto debugging
o test cases
automated testing

Answers

Answer:

user experience testingtest casesautomated testingprint debugging

Explanation:

The techniques which are useful when evaluating a program are user experience testing, test cases, automated testing and print debugging. Thus, option 1st, 2nd, 4th and 5th are correct.

What is Programming?

Programming is the process of carrying out a certain computation, often through creating and constructing an executable computer program. Programming activities include analysis, algorithm generation, algorithm accuracy and resource use assessment, and algorithm implementation.

The process of producing a set of instructions that tells a computer how to complete a task is known as programming. Computer programming languages such as JavaScript, Python, and C++ can be used to create programs.

Goal-based, process-based, and outcomes-based assessment methods are the three basic types of evaluation methodologies.

User experience testing, test cases, automated testing, and print debugging are always that may be used to evaluate an application. As a result, options 1, 2, 4, and 5 are correct.

Learn more about programming here:

https://brainly.com/question/11023419

#SPJ2

Need help asapppppppppp

Answers

Answer:

artistic

Explanation:

because being it is considered a art

Answer:

daddy

Explanation:

I need help building a computer what are some good parts?

Answers

Answer:

glass for the screen, wires to connect everything, something for the buttons, you also might need a screen protector so it can help your eyes because the screen will be bright, use something that will help the computer not fall off the desk, you also need to make some space at the bottom of the computer for the sound to go through, you need to make some more space at the either side you want the charger for it to always have power so you can always use it, and memory space, if you want to you can add a little space at the side for your earbuds.

Explanation:

you need to have your parents help you so you don't get hurt.

What is wrong with the following code?
numl = int (input("Enter a number: "))
numz = int (input("Enter a number: "D)
num3 = int (input("Enter a number: "))
print ("The average is: + (numl + num2 + num3/3)
The last line should be print ("The average is: (numl + num2 + num/3)
The variables should be lnum, 2num, Bnum
It needs a into command
It needs a stro command

Answers

Code:

numl = int (input("Enter a number: "))

num2 = int (input("Enter a number: "))

num3 = int (input("Enter a number: "))

print ("The average is:" + ((numl + num2 + num3)/3))

Answer:

It needs a str command

Explanation:

Given

The above code

Required

Determine and correct the error

At the last line of the code, there is an attempt to print the average of the three numbers.

However, this will return an error because:

In order to print the literal "The average is:" and the numeric value of (numl + num2 + num3)/3, a str command is needed.

This converts (numl + num2 + num3)/3 to a literal and then print without error.

So, the correct instruction is:

print ("The average is:" + str((numl + num2 + num3)/3))

WILL GIVE BRAINLIEST!!!!!!!!!
The Port of New Orleans is not considered an intermodal port.


True

False

Answers

Answer:

True

Explanation:

Other Questions
The ratio of wins to losses was 3 to 5 for the Jackalsbaseball team last season. The Jackals won 21 gameslast season.How many games did the Jackals lose last season? What is true about differentiated cells? *A. Differentiated cells have different functionsB. Differentiated cells can go back to being stem cellsC. Differentiated cells can undergo mitosis to make different cellsD. Differentiated cells are found in prokaryotes Footlocker has sale ln any three shirts for $55.50 meanwhile nike is having their own sale ln any five sale shirts for $79.99 which store offers the best deal what is your saving per shirt 69 Read the excerpt from "Perseus."He was bound, although he did not know it, to the blessed country of the Hyperboreans, at the back of the North Wind, of which it is said: "Neither by ship nor yet by land shall one find the wondrous road to the gathering place of the Hyperboreans. But Perseus had Hermes with him, so that the road lay open to him, and he reached that host of happy people who are always banqueting and holding joyful revelry. They showed him great kindness: they welcomed him to their feast, and the maidens dancing to the sound of flute and lyre paused to get for him the gifts he sought.What aspects of Greek life are reflected in the excerpt? Select four responses.1.People traveled by boat and roads.2.Animals were sacrificed to the gods.3.People held feasts to celebrate.4.Music was part of celebrations.5.Girls danced to music at feasts.6.Feasts were religious in nature. why is it that some abbreviations are banned from the practice of medicine? A balanced chemical equation is a direct presentation of the ___________.law of conservation of momentumlaw of conservation of energylaw of conservation of massideal gas law white a paragraph analysing the motifs in the book speak riding shotgun chapter Find the surface area of the prism.The surface area is square millimeters. Evaluate the extent to which immigration affected United States culture in the person from 1840 to 1898 Evaluate 5 + 3x for (a) x= -2 and (b)x= 3. Write your answers in simplest form. solve the following systems of equations. 5x+3y+4z=1 4x-7y+3z=0 x+5y-2z=-11 a summary on a cow called boy chapter 2 a sum of Rs.5,000 written off as depreciation on furniture has not been debited to depreciation account.Required : Rectifying entries. You set up a hot chocolate stand at a football game. The cost of your supplies is $75. You charge $0.50 for each cup of hot chocolate. Write a function that represents the profit P for selling c cups of hot chocolate. HELP PLEASE FOR BRAINLISTIA well-regulated militia, being necessary to the security of a free state, the right of the people to keep and bear arms, shall not be infringed. The writers of the Constitution believed that the people must have the ability to protect themselves and to fight back against an oppressive government. Today, some people argue that some of these original reasons behind the Second Amendment no longer apply. Others argue that the right to protect yourself is the really central idea of the Second Amendment and that guns are necessary for self-protection. Either way, the United States has the highest rate of gun ownership in the world. Which of the following statements would the people described in the underlined sentence likely agree with? A US citizens no longer have a need to protect themselves against an oppressive government. B Guns are necessary for self-protection. C US citizens should own more guns. D The US government is very oppressive, and citizens need to protect themselves in many different ways. What is the meaning of the two numbers used in the Snellen Eye Chart? Who refused to write the Declaration of Independence because he feared that his reputation for humor would distract from the document's purpose? a. Benjamin Franklinb. John Adamsc. Thomas Jeffersond. George Washington Landon hands out 120 flyers in 2 hours. Fernando hands out 29 flysers in 30 minutes. Which equation can be used to determine the number of flyers Fernando handed out in 2 hours? If infection primarily involves the outermost layers of adult amphibian skin, and if the chytrids use the skin as their sole source of nutrition, then which term best applies to the chytrids 2. There are two different sizes of Fanta Pinapple for you to get. The first one is a12 oz can, and the bottle has 33% more. How much does the bottle containapproximately?4 OZ0 21 ozO 16 ozO 19 oz