pdf
B. Ayusin ang mga titik sa bawat bilang upang mabuo ang mga
tamang salita na bumubuo ng web browser at mga ilang
bahagi ng web browser. Isulat ang iyong sagot sa sagutang
papel.
1. terterin ploexrer
2. glegoo mechro
3. foxfire zillamo
4. bat mena
5. bat wen​

Answers

Answer 1

Answer:

Question wants the misspelled words to be properly arranged to give the correct names in relation to web browsers.

terterin ploexrer ⇒ Int-ernet Ex-plorerglegoo mechro ⇒ Goo-gle Ch-romefoxfire zillamo ⇒  M-o-z-i-l-l-a Fire-foxbat mena ⇒ Tab name.bat wen​ ⇒ New Tab

Related Questions

Photographs that are too dark or too light can be difficult to fix with photo-editing software.
True
False

Answers

The answer is true :)
True. ———-///———-//————

If you wanted to use the numeric key pad to multiply 8 and 5 and then divide by 2, you would type
1. 8/5*2
2. 5/2/8
3. 8*5*2
4. 8*5/2

Answers

Answer:

Option 4 would be your best answer

Explanation:

The * means multiply

And the / means Divide

Hope this helps :D

4) 8*5/2 would be the correct answer to your question

Match the data type to the given data.
1. float
2. array
3. Boolean
4. character

false
с
c, o, m, p, u, t, er
26.2

Answers

Float: 26.2
Array: c, o, m, p, u, t, er
Boolean: false
Character: c

What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
A. 0.067
B. 0.533
C. 8
D. 15

Answers

Answer:

8

Explanation:

Gear reduction = driven gear teeth / driving gear teeth

First stage reduction :

Driven gear teeth = 36

Driving gear teeth = 12

36 /12 = 3

Second stage reduction :

Driven gear teeth = 60

Driving gear teeth = 12

60 /12 = 5

First stage + second stage

3 + 5 = 8

are used for mechanical power transmission over long distances
A. Spur Gears
B. Helical Gears
C. Planetary Gears
D. Chain and Sprockets

Answers

Answer:

D. Chain and Sprockets

Explanation:

Chains and sprockets are power transmission tools. The roller chain is connected to a toothed wheel which is the sprocket. The combination provides mechanical power to the wheels of vehicles.

An advantage they possess is their ability to transmit mechanical power over both short and long distances. They have a high degree of efficiency but they require constant lubrication. They also produce noise during operation.

Is a defense of a political position an argument

Answers

Answer:

yes

Explanation:

yyyyyyyyyyeeeeeeeeesssssss

Help fast

When comparing and what is the main difference?
O The first symbol is for reviewing text and the second for enlarging text.
The first symbol is for spacing and the second for sizing.
O The first symbol is for viewing text and the second for inserting text.
O The first symbol is for inserting text and the second for viewing text.

Answers

Answer:

The first symbol is for inserting text and the second for viewing text

Explanation:

few toffees were distributed among oriya , piyush and payal . priya got 3/8 , piyush and payal 1/8 and 1/2 of total toffees respectively. who got the maximum toffees​

Answers

Answer:

it is payal because 1/2 is a half

Explanation:

there you go

What are the challenges of giving peer feedback in peer assessment

Answers

Feeling of underachievement

Answer:

There can some challenges when giving and receiving peer feedback in a peer assessment. Some people can be harsh in their assessments of your work. Some students cannot take that and because of that it can cause them to question a lot of their work. People can also be wrong when it comes to the assessment

Choose all items that represent essential tasks to do after an interview is over.
Send copies of the resume and cover letter.

Construct a career portfolio.

Ask about next steps and the best way to communicate.

Phone each person interviewed.

Send a follow-up email within 24 hours.

Submit the job application.

Answers

Answer:

Ask about next steps and the best way to communicate.

Send a follow-up email within 24 hours.

Explanation:

An interview is a well-organized conversation where one participant asks questions, and the other person gives answers to those questions.

Essential tasks that need to be done after an interview is over are as follows:

1. Ask about next steps and the best way to communicate.

2. Send a follow-up email within 24 hours.

Answer:

Ask about next steps and the best way to communicate.

Send a follow-up email within 24 hours.

Help plz brainliest.

Answers

Answer:

Follows are the solution to this question:

Explanation:

In this question, the equation will be written as the coefficients for each of the bases, that is from the above quantum states b is given as follows:

[tex]\to | b \rangle = 0.4 | 00 \rangle + 0.65 | 01 \rangle + 0.2 | 10 \rangle + 0.61 | 11 \rangle[/tex]

Therefore the equation can be written as in the state b:

[tex]\to \mathbf{state_b = [0.4, 0.65, 0.21, 0.61]}[/tex]

When query data is exported to a document it is most effectively displayed in a
file.
paragraph.
text field.
table.

Answers

Answer:

The answer is "file".

Explanation:

The query data would be a collected data and data action, in which users are using a query in needed to respond to a reasonable question, adjust, combine data from a table or indeed to join, change, or erasing table data, consequently, this is most derive conclusions in a file so if query data are exported to the document, that's why the other choices were wrong.

Write a C console application that will be used to determine if rectangular packages can fit inside one of a set of spheres. Your program will prompt the user for the three dimensions that define a rectangular box; the length, the width, and the height. The interior diameter of a sphere is used to identify its size. Spheres are available in the following five sizes: 4- inch, 6-inch, 8-inch, 10-inch, and 12-inch. Your program will execute repeatedly until the user enters a value of zero for one or more of the rectangular box dimensions. After obtaining the dimensions of the rectangular box, your program will call a function named getSphereSize that determines if the box will fit inside one of the five spheres. The formula for calculating the diagonal of a rectangular box is:

Answers

Answer:

#include <cmath>

#include <iostream>

using namespace std;

int getSphereSize(double length, double breadth, double height) {

   double diagonal = sqrt(length * length + breadth * breadth + height * height);

   if (diagonal <= 4)

       return 4;

   if (diagonal <= 6)

       return 6;

   if (diagonal <= 8)

       return 8;

   if (diagonal <= 10)

       return 10;

   if (diagonal <= 12)

       return 12;

   return 0;

}

int main() {

   double length, breadth, height;

   int sphereCounts[5] = {0};

   int sphereSize;

   while (true) {

       // Get dimensions of the box

       cout << "Enter the dimensions of the box:\n";

       cout << "Length: ";

       cin >> length;

       cout << "Breadth: ";

       cin >> breadth;

       cout << "Height: ";

       cin >> height;

       if (length <= 0 || breadth <= 0 || height <= 0)

           break;

       sphereSize = getSphereSize(length, breadth, height);

       if (sphereSize == 0)

           cout << "The box cannot fit in any of the spheres";

       else

           cout << "The box can fit in the " << sphereSize << "-inch sphere";

       // Increment the counter

       if (sphereSize == 4)

           sphereCounts[0]++;

       else if (sphereSize == 6)

           sphereCounts[1]++;

       else if (sphereSize == 8)

           sphereCounts[2]++;

       else if (sphereSize == 10)

           sphereCounts[3]++;

       else if (sphereSize == 12)

           sphereCounts[4]++;

       cout << "\n\n";

   }

   cout << "\nNumber of 4-inch spheres: " << sphereCounts[0];

   cout << "\nNumber of 6-inch spheres: " << sphereCounts[1];

   cout << "\nNumber of 8-inch spheres: " << sphereCounts[2];

   cout << "\nNumber of 10-inch spheres: " << sphereCounts[3];

   cout << "\nNumber of 12-inch spheres: " << sphereCounts[4];

   cout << endl;

   return 0;

}

Explanation:

The "cmath" library is included in the c++ program. The getSphereSize function is used to return the sphere size the rectangle dimension can fit into. It program continuously prompts the user for the length, breadth, and height of the rectangle and passes the values to the getSphereSize function in the while but breaks if any or all of the variable value is zero.

The sizes of the sphere objects in inches are collected in an array of five integer values of zeros and are incremented by one for every match with a rectangle.

Write a program that reads in ten numbers from the user and displays the distinct numbers. If a number entered by the user appears multiple times, your program needs to filter the repeated numbers and therefore displaying the repeated numbers only once. For example, if the user enters the number 1, 4, 6, 1, 8, 4, 2, 1, 3,9 then the output of your program should be: 1, 4, 6, 8, 2, 3, 9.

Answers

Answer:

Here you go :)

Explanation:

Change this however you'd like:

array = []

for n in range(10):

   x = int(input("Enter integer: "))

   array.append(x)

dup = set(array)

print(", ".join(str(i) for i in dup))

How do you add a space after a line in my terminal workspace?'

Example: I'd like my program to have a line space after

Line 2: "Computer Programming"
blank
Line 3: Author
blank
Line 4: Due Date

Answers

Press enter hope that helps

Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets from the file. When one of these packets arrives to a packet switch, what information in the packet does the switch use to determine the link onto which the packet is forwarded

Answers

Answer:

The answer is below

Explanation:

Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.

When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.

compared to EMT, IMC is?​

Answers

When compared to EMT, IMC (intermediate metal conduit) is a thinner and also have a lighter-weight .

What is the comparison in IMC vs. EMT

Note that EMT  is one that cannot be threaded and is not set up for strong connections like IMC and RMC.

In regards to residential wiring, IMC is known to be the one that is said to be often and usually limited to service entrance assemblies as well as exposed and it often  runs to and fro.

Therefore, When compared to EMT, IMC (intermediate metal conduit) is a thinner and also have a lighter-weight .

Learn more about metal conduit from

https://brainly.com/question/5023977

#SPJ1

What episode and Season of Simpsons is this

Answers

Answer:

season 9 episode 23.65 and the bases it 12

The Office Assistant is available in Access just like it is in other Office applications,True
False

Answers

Answer:

True.

Explanation:

Microsoft Access can be defined as a software application or program designed by Microsoft corporation to avail end users the ability to create, manage and control their database.

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

An Office assistant refers to an intelligent user interface designed and developed by Microsoft Inc as a user interface for all of the Microsoft Office applications. It is designed to provide assistance or help end users by making the retrieval of information from Office help interactive through the use of animated characters.

Hence, the Office Assistant is available in Access just like it is in other Office applications.

Please help ASAP! will mark brianliest! 30 points!
Which popular VPN protocol allows segment access for users?

IPsec
PPTP
L2TP
SSL VPN

Answers

Answer:

SSL VPN

Explanation:

Secure Sockets Layer, or SSL VPN, is the second common VPN protocol.

A big plus for SSL VPNs is that they can allow segmented access for users. For example, users can be limited to checking email and accessing shared drives rather than having access to the entire network.

SSL VPNs come in two types, SSL portal and SSL tunnel.

SSL Portal VPNs

SSL Portal VPNs allow a user to securely access the web from a browser once the user logs into the VPN’s online portal using a specified method of authorization.

This type of SSL VPN gets its name because of how the user accesses it – through a single web page, or portal. The page acts as a single gateway to the other services available on the secured network.

SSL Tunnel VPNs

SSL Tunnel VPNs allow the user to not only access the web securely, but to also use applications and other network services that aren’t based on the web.

Due to their sophisticated segmentation capabilities, SSL VPNs often require more skill to implement.

VPNs are not a cure-all

Of course, what you could do is circumvent the entire debate around VPN SSL vs IPSEC. Our Gatekeeper offering is an enhanced alternative to VPN with no client, that still offers two-factor authentication to secure remote access.

Wherever you land between VPN SSL vs IPSEC, of if you join #TeamGatekeeper, having one of these tools to protect web traffic is a great way to help secure information, but it’s not an end-all be-all security solution.

After all, a VPN won’t protect your employees from social engineering attacks such as email phishing.

(hope this helps can i plz brainlist it will make my day :D hehe)

Implement the ArrayMethod application containing an array that stores eight integers. The application should call the following five methods: 1. display - should display all the integers 2. displayReverse - should display all the integers in reverse order 3. displaySum - should display the sum of the integers 4. displayLessThan - should display all values less than a limiting argument 5. displayHigherThanAverage - should display all values that are higher than the calculated average value.

Answers

Answer:

public static void display(int [] arr){

   System.out.print("Arrays: ");

       for(int i =0;i<arr.length;i++){

           System.out.print(arr[i]+" ");

       }

       System.out.println();

   }

   

public static void displayReverse (int [] arr){

   System.out.print("Arrays in reverse order: ");

       for(int i=arr.length-1;i>=0;i--){

           System.out.print(arr[i]+" ");

       }

       System.out.println();

   }

   

public static int displaySum (int [] arr){

   System.out.print("Sum: ");

   int sum = 0;

       for(int i =0;i<arr.length;i++){

           sum+=arr[i];

       }

       return sum;

   }

   

public static void displayLessThan (int [] arr, int num){

       System.out.print("Less than "+num+": ");

       for(int i =0;i<arr.length;i++){

           if(arr[i]<num){

               System.out.print(arr[i]+" ");

           }

       }

       System.out.println();

   }

public static void displayHigherThanAverage  (int [] arr){

       System.out.print("Higher than average: ");

       int sum = 0;

       for(int i =0;i<arr.length;i++){

           sum+=arr[i];

       }

       float average = sum/arr.length;

       for(int i =0;i<arr.length;i++){

           if(arr[i]>average){

               System.out.print(arr[i]+" ");

           }

       }

       System.out.println();

   }

Explanation:

The methods were written in Java. See attachment for explanation where I used comments to explain each lines.

Note that lines that begin with double slash (//) are comments

The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and each line contains the number of steps taken during a day. (The first line is the number of steps taken on January 1st, the second line is the number of steps taken on January 2nd, and so forth.) Write a program that reads the file, then displays the average number of steps taken for each month. (The data is from a year that was not a leap year, so February has 28 days.)

Answers

Answer:

In Python:

file = open('steps.txt', 'r')

readLine = file.readlines()

begin = 0

mdays = (31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31)

print("Month"+"\t\t"+"Average Steps")

for m in range(len(mdays)):

end = begin + mdays[m]

steps = readLine[begin:end]

sumsteps = 0

for s in steps:

 sumsteps = sumsteps + int(s)

 

average = round(sumsteps/mdays[m],1)

print(str(m+1)+"\t\t"+str(average))

begin = begin + mdays[m]

Explanation:

This line opens the step.txt file

file = open('steps.txt', 'r')

This reads the content of the file

readLine = file.readlines()

begin = 0

This initializes the months of the days to a tuple

Mmdays = (31, 28, 31, 30, 31, 30, 31, 31, 30, 31, 30, 31)

This prints the header

print("Month"+"\t\t"+"Average Steps")

This iterates through the tuple

for m in range(len(Mmdays)):

This calculates the days in each month

end = begin + Mmdays[m]

This gets the number of steps in each month

steps = readLine[begin:end]

This initializes the number of steps to 0

sumsteps = 0

This iteration sums up the number of steps in each month

for s in steps:

 sumsteps = sumsteps + int(s)

This calculates the average of steps rounded to 1 decimal place  

average = round(sumsteps/Mmdays[m],1)

This prints the calculated average

print(str(m+1)+"\t\t"+str(average))

This calculates the beginning of the new month

begin = begin + Mmdays[m]

Name a type of malware designed to provide unauthorized , remote access to a user's computer

Answers

This is called Remote Access Trojan.

Please answer today 20 pts!!

Type the correct answer in the box. Spell all words correctly.
Joe is a part of a team where the members come from various cultures and have different perspectives and viewpoints. What does Joe need to
improve in order to work successfully in the team?
In order to work successfully in the team, Joe needs to improve his awareness of _______.

Can only be 1 or 2 words.

Answers

Answer:

give each member their own translator and a seprate workspace

sry bout the spelling

Explanation:

“Jon is a DJ and he spends a lot of time traveling around the country to perform at concerts and festivals. He has a large music collection which he must be able to easily transport with him wherever he goes.” [6 marks]
Please answer

Answers

Answer:

there is no exact question to answer here i could help you if you explained it more in the comment section of this answer! sorry!

Explanation:

“Jon is a DJ, and he spends a lot of time traveling around the country to perform at concerts and festivals. The best storage device for him is the hard disk.

What is a hard disk?

A hard disk, also known as an HDD, is a non-removable, rigid magnetic disk with a large data storage capacity. While a Compact Disc is a small plastic disc on which music or other digital information is stored in the form of a pattern of metal-coated pits that can be read using laser light reflected off the disc.

A hard disk is a large plastic disc on which music or other digital information is stored. By moving all parts of a file to contiguous blocks and sectors, a good defragmentation utility can reduce access time.

Therefore, "Jon is a DJ who spends a lot of time traveling across the country performing at concerts and festivals." A hard disk is the best storage device for him.

To learn more about the hard disk, refer to the below link:

https://brainly.com/question/14867477

#SPJ2

The question is incomplete. Your most probably complete question is given below:

What is the best storage device for him?

which of the following is not a benefit of aws cloud computing​

Answers

Answer: High latency, temporary and disposable resources are not the benefits of AWS cloud computing.

Explanation: AWS is the most reliable and broad platform that offers a wide range of feature services to individuals globally.

Hope this helps (:

5.16 LAB: Intersection of two lists Programming Objectives With two user input lists, such as the example below: [1,3,6,78,35,55] and [12,24,35,24,88,120,155], write a program to make a list whose elements are intersection (common) of the user input lists. Please note that redundant elements should be counted only once. Technical Descriptions Your program should interact with its user such that two lists of different number of elements can be arbitrarily specified through program input. With the lists above as an example:

Answers

Yeeeeeeeeeeeeeeeeeeeeeee

multiple keys may represent a primary key true or false​

Answers

The answe is true
I believe

Choose all items that represent common website
design flaws.
menu at the top of the page
distracting background
short page-load times
too many or confusing fonts
poor navigation
dead hyperlinks

Answers

Isn’t it basically all of them haha?

Answer:

2,4,5,6

Explanation:

just answered it

determine the factors using computer failures and defects​

Answers

Answer:

Voltage spike – This is a momentary change in the supply of electric power. It’s important to remember that the size of the transient can range from just milliseconds to longer periods of time. Even a small power glitch can damage a computer and corrupt data. If the screen goes blank during a thunderstorm, it’s likely that a voltage spike is responsible.

Circuit board fails with no visible indication of damage – This is the typical scenario: A computer goes down. A defective circuit board is suspected of the fault, but an inspection reveals no signs of physical damage. A replacement board is installed and operation resumes.

Failure to load software upgrades – Computer software often comes with various bugs, or vulnerabilities. These are simply programming mistakes, but they can make the software susceptible to viruses and glitches. When an error is discovered, the software designer sends out a “patch” that requires downloading and rebooting. Failing to upgrade the software by running the patch can lead to corruption of data.

Failure to keep virus protection up to date – There are several malware protection packages available for computer rooms or data centers. Once installed, the subscription must be maintained. One telltale sign of a malware infected computer is slow data processing.

Inadequate cooling – Computers produce heat, and the more data they process, the more heat must be eliminated. Servers, the “brains” of computers, fail under excess heat, so adequate cooling is essential.

Environment – If a computer room has a dedicated cooling system, there may be an opportunity to closely control the heat. If the cooling is shared with other equipment or the space contains offices, we often face a more challenging task. People have comfort needs different to those of computers.

Loss of Power, PDU fails – Power Distribution Units (PDU’s) are similar to power bars in homes and offices. They distribute power to different components in a computer room, and are usually located next to the server racks. PDU’s suffer a range of problems. Receptacles wear out and can be the sources of bad contacts, and moisture can lead to corrosion.

UPS batteries – Uninterruptible Power Supply (UPS) batteries are found in computer rooms. Most often, they are used to provide continuous power for a limited time, during an outage. Depending on how it’s used and the design of the battery, the life span can be as short as 4-5 years for what is considered a “10 year life” battery. Elevated room temperatures will shorten the life of any battery. Even a small facility such as a dentist office uses UPS batteries.

Transfer switch battery defective – This can be an indication that the site lacks an effective battery maintenance program. It can also be a sign that the transfer switch is “frozen” in position. Preventive maintenance could help avoid a breakdown.

Failure of standby power to synchronize (come on line) – When electric power from the grid disappears, standby power takes over in two different ways. In a small computer room, the focus is on turning computers off in a controlled manner. A fully charged UPS will provide power for 10-15 minutes to allow a computer to save its data and turn off. In a larger facility, it’s the matter of keeping cooling and power going long enough to give the standby generator an opportunity to “synchronize,” to get up to a rate of speed sufficient to power the infrastructure and continue data processing.

Diesel fuel contaminated – Most medium to large facilities have generators powered by diesel fuel, which can become contaminated and useless when a power outage occurs. Water is usually the culprit. Regular fuel testing is necessary to avoid contamination.

Storage defective – Data is stored on magnetic disks or tape. Both can be damaged during normal operation, so it’s a good practice to back up stored data on a regular basis. Backing up means creating a spare data storage. Failure of a tape or disk drive is often, but not always, proceeded by noise. Opening the unit to attempt data restoration is better left to a professional.

Sprinkler system turns on above the servers – Where a data room is protected by a water sprinkler system, a small spill can damage the electronic components. This is particularly true in cases where sprinkler heads are located directly above the servers.

Computers are crucial to business today, but there are so many things that can cause them to fail. By addressing the above common culprits, you could help reduce the overall risk of your computer systems failing.

Explantion: I hope this helps!!!!! :)

Other Questions
please guys correct answers! The volume of a cone is 800 cubic cm and the radius is 9 cm. Calculate the height. who do you solve this? What two Latin American countriesshare an island? FIND X AND YHELP PLZ ASAP WHAT EFFECT DID THE SEAS HAVE ON THE GREEKS? HOW DID IT IMPACT THE WAY THEY LIVED? Find X and Y I need help plz ASAP Read the excerpt from "The Most Dangerous Game."Laughter shook the general. "How extraordinarily droll you are!" he said. "One does not expect nowadays to find a young man of the educated class, even in America, with such a naive, and, if I may say so, mid-Victorian point of view. It's like finding a snuff-box in a limousine. Ah, well, doubtless you had Puritan ancestors. So many Americans appear to have had. I'll wager you'll forget your notions when you go hunting with me. You've a genuine new thrill in store for you, Mr. Rainsford.""Thank you, I'm a hunter, not a murderer.""Dear me," said the general, quite unruffled, "again that unpleasant word. But I think I can show you that your scruples are quite ill founded."Which detail best reveals that Rainsford opposes Zaroffs idea of the ideal prey?"How extraordinarily droll you are!" he said. You've a genuine new thrill in store for you, Mr. Rainsford."Thank you, I'm a hunter, not a murderer."But I think I can show you that your scruples are quite ill founded. g 8. A hydrogen atom is initially a rest and in the ground state. A proton with kinetic energy 1000 eV scatters off the atom. In the process the hydrogen atom is ionized. The kinetic energy of the ionized electron is measured to be 15.2 eV and the kinetic energy of the proton produced from the ionization of hydrogen is 4.3 eV. What would be the final kinetic energy of the projectile proton after the collision HELP ME I NEED HELP what is 22*62-13+28 PLEASE SHOW WORK ILL GIVE BRAINLIEST DUE TODAY!!!14 + 18 2 x 18 7 15 x 10 + 12 3 + 9 8 x 4 + 9 9 + 18 2 - 1 + 5 x 4 x 11 60 9 x 8 8 x 6 (10 5)3 + 100 9 x 11 3 x 8 x 2 42 + 5 14 2 -1 + 3 How is a spark from touching a doorknob the same as a bolt of lightning True or False: There are five (5) of Newton's Laws of Motion * please help me!!!!!!!!!!!!! Write a letter to your friend in another school telling him reasons why you like your school. A wave with a height of 6 would have greater amplitude than a wave with a height of 5 true or false? HELP Anyone know the answer for this find the volume of 4ft 2 ft 3 ft What is the measure of Help me please !!! And thank you