PLEASE SOMEONE PLEASE HELP ME OUT!!!!

PLEASE SOMEONE PLEASE HELP ME OUT!!!!

Answers

Answer 1

Answer:   Ideate

Explanation:

Answer 2

Answer:

the 1st one

Explanation:


Related Questions

Question 4Write a C++ program which display the following shape.
*****

Answers

Answer:

The code to this question can be defined as follows:

#include <iostream>//header file

using namespace std;//namespace

int main()//main method

{

int x,y;//defining variable

for(x = 1; x <= 7; x++)//defining outter for loop for print rows

{

for(y = 1; y <= 7; y++)//defining inner for loop for print column

{

if(y <= x)//defining if block to check y less then equal to x

cout << "*";//print asterisk value

else//defining else block

cout << " ";//use for spacing

}

for(y = 7; y >= 1; y--)//defining for loop for print right triangle

{

if(y <= x)//defining if block to check y less then equal to x

cout << "*";//print asterisk value

else//defining else block

cout << " ";//use for spacing  

}

cout << "\n";//use for line break

}

return 0;

}

Output:

please find the attachment.

Explanation:

In the above program code, two integer variable "x, y" is declared, which is used in the for a loop. In this, two for loop is used to print the left triangle, and the last loop is used to print the right triangle. In both, the loop uses if block to check y is less than equal to x and print the asterisk value with the spacing.

explain Text align , Text Decoration, colour, Text shadow..​

Answers

Answer:

Text align, text decoration and text shadow are all some of the important features in CSS.

Explanation:

CSS is a programming language. It stands for Cascading Style Sheets. It is the style sheet language that is used for describing a presentation of any document that is basically written in HTML.

Text Align : This property allows the horizontal alignment of a text in an element. A text can be right align, left align, justified or centered.

Text Decoration : The text decoration features in CSS helps to set or helps to remove the decorations from the text. These are drawn across the descendant text elements.

Text shadow : This property simply allow us to add or put a shadow to the text.

To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however, you can browse the internet, but you are unable to perform secure credit card transactions when making purchases from e-commerce websites. Which port needs to be enabled to allow secure transactions

Answers

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

about IPO cycle with a digram

Answers

Answer:

The IPO Cycle is termed as Input-Processing-Output cycle. A computer receives data as input, processes it, stores it and then produces output. ways. This manipulation is called processing.

What is a slide master ?​

Answers

Explanation:

Slide Master is a tool used in Microsoft PowerPoint to create slide templates. Slide Master can save slide layouts, including the background, color, fonts, effects, positioning, etc.

hope it helps!

Answer:

A slide master is the top slide in a hierarchy of slides that stores information about the theme and slide layouts of a presentation, including the background, color, fonts, effects, placeholder sizes, and positioning. Click to select the master slide, then click Master Layout on the Slide Master tab.

You are considering implementing a backup scheme for a server. After researching options, you decide on a method that does not reset the archive bit after a backup. Which method have you chosen?

Answers

Answer:

C. A cold site is a leased facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring. No communications equipment, networking hardware, or computers are installed at a cold site until it is necessary to bring the site to full operation.

Explanation:

A proprietary software license allows users to install and use the software on any number of computers. install and use the software after agreeing to the terms of the license. inspect, modify, and redistribute the software. copyright and resell the software.

Answers

Answer:

install and use the software after agreeing to the terms of the license.

Explanation:

A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.

Basically, softwares are categorized into two (2) main categories and these are;

I. Open-source software.

II. Proprietary software.

A proprietary software is also known as a closed-source software and it can be defined as any software application or program that has its source code copyrighted and as such cannot be used, modified or distributed without authorization from the software developer. Thus, it is typically published as a commercial software that may be sold, licensed or leased by the software developer (vendor) to the end users with terms and conditions.

Some examples of proprietary software are Microsoft Windows, macOS, Adobe photoshop etc.

Hence, a proprietary software license allows users to install and use the software after agreeing to the terms of the license.

A proprietary software license allows users to install and use the software after agreeing to the terms of the license.

Thus, option (b) is correct.

Users are required to agree to these terms before they can legally install and use the proprietary software. The license agreement may outline specific restrictions, limitations, and permitted usage scenarios.

Installing and using the software on any number of computers: This is not necessarily true for proprietary software.

Inspecting, modifying, and redistributing the software: These activities are typically not allowed under a proprietary software license, as they generally provide limited or no access to the source code and impose restrictions on modifications and redistribution.

Copyrighting and reselling the software: These rights are typically retained by the software's copyright holder and are not granted to users under a proprietary software license.

Therefore, install and use the software after agreeing to the terms of the license.

Thus, option (b) is correct.

Learn more about Software installation here:

https://brainly.com/question/7548929

#SPJ6

The question attached are seems to be incomplete, the complete question is:

A proprietary software license allows users to :

install and use the software on any number of computers.install and use the software after agreeing to the terms of the license.inspect, modify, and redistribute the software.copyright and resell the software.

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data

Answers

in ciphertext-only.

EXPLANATION: it is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. The attack is completely successful if the corresponding plaintexts can be extracted or, even better, the key.

How do you send friend requests?

Answers

Answer:

i dont know how too i dont think you can

Can someone please give me Python test 3 it would help me tremendously

Answers

Question 1:  To tell what will happen when an if-statement is false.

Question 2: The = should be ==

                    elseif should be elif

                    The else should have a :

Question 3: All algorithms can only do number calculations.  

Question 4: and

Question 5: To make a follow-up True/ False decision

Question 6: if (text1 > 15):

Question 7: if (text1 == 78):

Question 8: if (num1 != num2):

Question 9: >=

Question 10: 4

Question 11: 3

Question 18: a < b and a != b  

Question 19: !=

Sorry about 12 - 17 and 20 i can't seem to find those questions guessing you wanted edhesive. I dont have an account on it.

to generate a series of first ten counting number of algorithm​

Answers

uhh i need points so i don’t fail math.

What are presenter notes?

Answers

Presenter notes are for showing to other people

Answer:

notes on like a presenting app that will help you present better so like your notes

Explanation:

If the transmitting device would like for the receiving device to push currently buffered data to the application on the receiving end immediately, it would set the ____ flag.

Answers

Answer:

The right approach will be "PSH".

Explanation:

The PSH flag seems to be an acceptable solution through TCP which always encourages the submit implementation to immediately transfer data but only whenever the buffer isn't complete. The implementation helps to formulate this same flag towards true for something like the connection, as well as TCP will instantly begin transmitting the relevant information.

Which symbol is used for exponentiation in QBASIC ?
Short answer​

Answers

Answer:

The symbol which is used for exponentiation in QBASIC is '^' .

Please help! Due by tonight! Greatly appreciated!

Answers

Answer:

Im sorry if im wrong but i took a class for coding a long time ago but i think  it is 6 :)

Who knows songs that are sad,happy,excited, and calm

Tell me three 4 each i will give out brainliest

Also include the author

Answers

sad-

you broke me first

can we kiss forever

love the way you lie

happy-

Say Yes

Valerie

Walking on Sunshine

excited-

who let the dogs out

September

calm-

heather

put your records on

lonely

Brainly, ""helping you get better grades"
ahem im sorry but uh ur lying because i made a C on my exam and im really mad smh

Answers

Answer: What do you except? All of this is user generated..

Explanation:

Yikes- well I mean these are real people answering so they could make mistakes too

The speed of mainfarme computer is measured in...... fill in the blanks​

Answers

Mainframe computers are huge towering machines with lots of processing power and are measured in MIPS (Million Instructions Per Second). Windows Explorer is the operating system's file and folder manager. A minicomputer can support about 200 users at the same time. They are referred to as small or mid-size servers.

Explanation:

Mainframe computers are huge towering machines with lots of processing power and are measured in MIPS (Million Instructions Per Second).3 days

please help please I will count your answer brainiest if you help!
In what ways are math and computer science similar? How are they different?

Answers

Answer:

Without mathematics, computer science would not exist. Computers use algorithms to obtain certain information, and output certain information. Linear equations and algebra are used to create gaming graphics.

Have you ever wondered how your online quizzes were made? Inside the online quizzes there is code behind it, this code uses variables, integers, and booleans.

Variables use equations like x and y to find sum. A boolean is a basic algebraic notation, it's a binary variable.

Everything uses math, nothing would exist without math, including even digging dirt.

when a plant responds to changes in the length of day by flowering during certain seasons,it is called​

Answers

Answer:

It occurs in plants and animals. Photoperiodism can also be defined as the developmental responses of plants to the relative lengths of light and dark periods. They are classified under three groups according to the photoperiods: short-day plants, long-day plants, and day-neutral plants.

Desktop computers are often provided in the workplace by organizations, and laptops may be as well. However, portable devices (such as tablets and smartphones) may more commonly be allowed on a BYOD basis. For a BYOD (personally-owned) device:

Answers

Answer:

Organizations may have requirements about how BYOD devices may be configured to access the information resources of the organization.

Explanation:

Desktop computers and laptops are often provided for the employees in the workplace. On a BYOD basis, portable devices such as tablets and smartphones may more commonly be used.

For a BYOD (personally-owned) device, organizations may have requirements about how BYOD devices may be configured to access the information resources of the organization.

What is the size of 5th generation of computer and what language does they use??​

Answers

Answer:

The period of fifth generation is 1980-till date. In the fifth generation, VLSI technology became ULSI (Ultra Large Scale Integration) technology, resulting in the production of microprocessor chips having ten million electronic components

Fifth-generation languages are used mainly in artificial intelligence research. OPS5 and Mercury are examples of fifth-generation languages. as is ICAD, which was built upon Lisp. KL-ONE is an example of a related idea, a frame language

Explanation:

1980 until the present is the fifth generation's time frame. When VLSI technology evolved into ULSI (Ultra Large Scale Integration) technology in the fifth generation, microprocessor chips with 10 million electronic components were created.

What is 5th generation computer?

Artificial intelligence research is the principal application for fifth-generation languages. Examples of fifth-generation languages are OPS5 and Mercury. ICAD, which is based on Lisp, is also. KL-ONE is an illustration of a frame language, a related concept.

After the creation of the fourth-generation computers, the fifth generation was introduced. Modern computers, also referred to as fifth-generation computers, are currently under development and are based on artificial intelligence.

In 1982, the FGCS was developed in Japan (Fifth Generation Computer System). This generation of computers uses parallel processing and microelectronic technology, which has a high processing capacity.

Therefore, 1980 until the present is the fifth generation's time frame. When VLSI technology evolved into ULSI (Ultra Large Scale Integration) technology in the fifth generation, microprocessor chips with 10 million electronic components were created.

To learn more about computers, refer to the link:

https://brainly.com/question/21080395

#SPJ2

what is CPU ????....................​

Answers

Cumputor its just a short way to say it

Answer: Central Processing Unit

Explanation: The CPU is the “brain” of the computer. It means Central Processing Unit!

hope this helps ;)

Write negative impacts of ICT in our lives. atleast 4​

Answers

Answer:

#1: Reduced physical activity

#2: Eye strain/ easily prone to headaches

#3: Poor social skills

#4: Decline in mental health

Answer:

Reduced physical activity: A third negative effect of ICT is that users may adopt a more sedentary lifestyle. This can lead to health problems such as obesity, heart disease, and diabetes.

1.portable hard drive is an example of internal memory true or false

2.Command i’m user interface are using currently true or false

3. Temperature sensor is an input device true or false

4. Draft few headers and footers are visible true or false

Answers

1. false

2. false

3. false

4.true

1.False
2.False
3.False
4.True

What is Ce stands for?
O Carbon character
O Carbon calender
Carbon copy
O character change​

Answers

Explanation:

hello I don't know ok sorry

Nadia has inserted an image into a Word document and now would like to resize the image to fit the document better.

What is the quickest way to do this?

keyboard shortcut
sizing handles
context menu
sizing dialog box

Answers

Sizing handles but I’m not super sure

What three actions happen when you cloak a folder or file?

Answers

Answer:

A three actions happen when you cloak a folder or file is explained below in details.

Explanation:

You can cloak data and folders on the forgotten or local site. Cloaking eliminates cloaked data and folders from the subsequent actions:

Presenting Get, Check-In, and Check-Out executions

Producing reports

Getting newer local and newer forgotten files

Accomplishing sitewide executions, such as monitoring and modifying links

Synchronizing

Working with Asset panel contents

Refreshing templates and libraries

What does the National Institute of Standards and Technology do? Promotes innovation by advancing measurement standards promotes cooperation in metrology among several regions provides certifications to individuals working in the field of metrology provides mentors to individuals working in the field of metrology

Answers

Answer:

Promotes innovation by advancing measurement standards

Explanation:

The National Institute of Standards and Technology was Founded in the year 1901, this agency is a non-regulatory body that is found within the United States Department of Commerce.

The mission of this agency is the promotion of innovation and also industrial competitiveness through the advancing of measurement science, standards, and also technology in several ways that raises economic security and also brings about improvement in the quality of life.

Answer:

(D) promotes innovation by advancing measurement standards

Explanation:

in which genre of games do players most often have the power to shape how the story will end?

platformer games
shooter games
role-playing games
puzzle games

Answers

Role playgames are the most customizable

Answer:

role-playing games

Explanation:

Other Questions
What attack had Washington been preparing for before the Battle of Yorktown? The area of a rectangle is 216 inches squared. The ratio of the length to width is 3:2. Find the length and the width How did geography impact Spartas military tactics during the Peloponnesian War?Sparta did not have to worry about an invasion because it was located on top of a mountain.Athens was located on an island, forcing the Spartans to use many ships to transport its army.The stronghold of the Delian League was on Delos, requiring Sparta to have a strong navy.Athens's location made it difficult to attack, forcing the Spartans to destroy farmland and crops. Read the excerpt from "Island of Hope, Island of Tears." Giuseppe D'Amico (Teresa's father) "had a hard time finding a job in America. He was an electrician by trade, but he couldn't get a job in Manhattan because the electricians were already unionized." Which statement correctly identifies the cause-and-effect relationship? please help / The Hotel is 163 miles from your house.your car travels 10.5 miles for every litre of petrol. Work out approximately how many litres of petrol the journey will use.2/The price of petrol is 138.9 pence per litre Work out the approximate cost for the petrol to the hotel .3/ you expect to travel 50 miles in each hour of a jurney how long the whole journey should take use a proportion to find the length of side x for the pair of similar figures Don has four different chicken coops on his farm. He gathers eggs from each coop every day to sell at the local farmer's market each week. During one week in the summer, the production levels from the coops were compared. The number of eggs from coop B can be found by subtracting 10 from coop A's production, and then multiplying this result by two-fifths. The number of eggs from coop C can be found by adding 3 to coop A's production, multiplying this amount by 3, subtracting 4 from this total, and then dividing the whole result by 4. The number of eggs from coop D can be found by adding 7 to coop A's production, doubling this amount and then dividing the result by 3. A. Define a variable for the number of eggs produced by coop A. Then write expressions for the number of eggs produced by the other coops. B. If coop A produced 125 eggs, how many did each of the other coops produce? C. If the sum of the number of eggs from coop B and coop C was 24 more than the number - _____ is an illness that results from the heart and blood vessels not working properly. - _____ is a disease that causes swelling and pain in a person's joints. - _____ is a disease that makes it difficult for the person to breath. - _____ is an illness caused when abnormal cells within the body continue to grow and spread. - _____ is a disease that affects the way the body uses its main source of fuel. A. Asthma B. Arthritis C. Diabetes D. Heart Disease E. Cancer Mary invested $200 for 3 years at 5% per annum. John invested $300at the same rate. If they both received the same amount of money insimple interest, for how many years did John invest his money?a. 1 1/2b. 2c. 3d. 10 Why does the author of the editorial include statements made by the BP oil executives? A to show the contrast between the evidence and the companys official position B to emphasize that the oil company executives are truthful but unimaginative C to explain why BPs actions were understandable D to defend the companys actions both before and after the deep water oil spill Mr. and Mrs. Mustard have six daughters and each daughter has one brother. How many people are in the Mustard family? 1.) Describe the two diagrams of a bottled carbonated beverage shown below as greaterpressure or lower pressure, and then as greater solubility or lower solubility. How do these twoexamples illustrate the relationship between the solubility of a gas and its vapor pressure? Explain 2.) On the diagrams below, assume that each beaker contains an equal number of molesof solute. Label each solution as concentrated or dilute. Then indicate the approximaterelative volumes of each solution by describing the surface level on each beaker. Part A:Which statement supports the idea in Passage 4 that it was Anna's dream to become a wrangler?Anna believes her Papa does not have confidence in her.Anna feels she is just as qualified as the men on the cattle drive.Anna remembers the experiences she had on the ranch as a young child.Anna knows her Papa will need all the help he can get if there is a stampede.Part B:Select a sentence from Passage 4 that supports your response to Part A.Anna closed her eyes and tried to sleep, but couldnt. The men will need my help! (paragraph 3)She lost herself in memories of working on the ranch with Mama and Papa. That was when Anna had learned to love wrangling. (paragraph 10)At full speed, Anna guided Copper toward the stampeding cattle. (paragraph 16)Anna nodded, then headed toward the point to help force the leaders back into the herd. (paragraph 19) Which event led to the arrest and imprisonment of many National Womens Party activists?starting a hunger strikerepeatedly picketing the White Houseorganizing a march in Washington, D.C.lobbying Congress for gender equality What happens to the molecules as water freezes? A. The water molecules stop moving B. The water molecules move faster C. The water molecules slow down D. The water molecules react chemically to form ice molecules 1. define speedspeed formula2. define velocityvelocity formulaHow are velocity and acceleration related?3. define acceleration4.what is the force of gravity?this is due this Friday please help me 1/2 x 3/10 in simplest form This table shows the descriptions of careers of three individuals.IndividualCareer DescriptionsDerekDrives a mobile running store in a van that sells racing gear to runners at running events, such as marathonsTaylorStands by the entrance and exit of a retail shoe store and collects money for the merchandise that customers are buyingRashidaOversees that the aquariums for a fish tank store are made, stored, and transported according to scheduleWhich best describes the career each individual has?Derek is a Driver/Sales Worker, Taylor is a Customer Service Representative, and Rashida is a Supply Chain Manager.Derek is an Entrepreneur, Taylor is a Cashier, and Rashida is a Survey Researcher.Derek is an Entrepreneur, Taylor is a Customer Service Representative, and Rashida is a Survey Researcher.Derek is a Driver/Sales Worker, Taylor is a Cashier, and Rashida is a Supply Chain Manager. find the percent of the number 105% of 400 Russia is like __ in that it has atremendous reservoir of fresh water.A. AfricaB, CanadaC. EuropeD, China